Skip to content

Commit 997feb9

Browse files
committed
Update savedsearches.conf
Add generate_user_access_lookup saved search
1 parent 171c55d commit 997feb9

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

github_app_for_splunk/default/savedsearches.conf

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,3 +124,34 @@ request.ui_dispatch_view = search
124124
search = | mstats avg(_value) as "Avg" WHERE `github_collectd` AND metric_name="load.longterm" AND host="*" span=10s BY metric_name, host\
125125
| stats avg(Avg) as "Load" by metric_name, host\
126126
| xyseries host metric_name Load
127+
128+
[generate_user_access_lookup]
129+
action.email.useNSSubject = 1
130+
action.keyindicator.invert = 0
131+
action.makestreams.param.verbose = 0
132+
action.nbtstat.param.verbose = 0
133+
action.notable.param.verbose = 0
134+
action.nslookup.param.verbose = 0
135+
action.ping.param.verbose = 0
136+
action.risk.forceCsvResults = 1
137+
action.risk.param.verbose = 0
138+
action.send2uba.param.verbose = 0
139+
action.threat_add.param.verbose = 0
140+
alert.track = 0
141+
cron_schedule = 0 6 * * *
142+
description = This search will generate a lookup about the access to devsecops environment and write it to a lookup file
143+
dispatch.earliest_time = -30d@d
144+
dispatch.latest_time = now
145+
display.events.fields = ["host","source","sourcetype","sc4s_container","sc4s_destport","sc4s_fromhostip","sc4s_proto","sc4s_syslog_facility","sc4s_syslog_format","sc4s_syslog_severity","sc4s_vendor_product","data.permission","permission","old_permission","user_id","action","app","user_agent","url","status","category","signature","COMMAND","USER","user"]
146+
display.general.timeRangePicker.show = 0
147+
display.general.type = statistics
148+
display.page.search.mode = verbose
149+
display.page.search.tab = statistics
150+
display.visualizations.charting.chart = line
151+
display.visualizations.show = 0
152+
enableSched = 1
153+
request.ui_dispatch_app = github_app_for_splunk
154+
request.ui_dispatch_view = search
155+
search = | pivot Change Auditing_Changes earliest(_time) AS "first_access" latest(_time) as "last_access" SPLITROW action SPLITROW command SPLITROW user SPLITROW object SPLITROW change_type SPLITROW object_category SPLITROW dvc\
156+
| table first_access,last_access,user,command,action,dvc\
157+
| outputlookup last_access_by_user

0 commit comments

Comments
 (0)