Splunk Enterprise

Modification of the "_raw" field

nembela
Path Finder

Hi,

I havethe following search

index="windows" source=WinEventLog:Security  ([| inputlookup windows_group_change_events | where group_action like "member added" or group_action like "member removed" |  fields EventCode ]) NOT src_user=portalsync
|  ldapfilter search="(&(objectClass=group)(cn=$Group_Name$))" attrs="distinguishedname,description, info"
| eval _raw = json_object("time", _time, "action_by", src_user, "event_code", EventCode, "group", mvindex(Security_ID, 2), "member", mvindex(Security_ID, 1),"orig_sourcetype", sourcetype, "orig_host", host, "dn", distinguishedName, "desc", description, "info", info ) 
| fields _time, _raw
| collect index=windows_ad_summary addtime=0 source="windows_group_management"

 

I try to save the group membership change events to a different index for long-term retention.

I got the original idea from here: https://conf.splunk.com/files/2017/slides/using-splunk-enterprise-to-optimize-tailored-longterm-data...

My problem is that this search always returns "no results".

If I omit the "fields" and "collect" commands it returns results as intended. Also if I omit the "ldapfilter" command it works just fine.

Do you have any idea what is the problem with the combination of "ldapfilter" and "fields"?

 

Thanks,

Laszlo

 

Edit: I'm using Splunk 8.0.9

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...