-
Notifications
You must be signed in to change notification settings - Fork 377
/
Copy pathuser_activity_via_cloudtrail.json
57 lines (57 loc) · 1.67 KB
/
user_activity_via_cloudtrail.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
{
"creation_date": "2018-01-22",
"data_metadata": {
"data_source": [
"AWS CloudTrail logs"
],
"data_sourcetypes": [
"aws:cloudtrail"
],
"providing_technologies": [
"AWS"
]
},
"description": "This search lists all the logged CloudTrail activities by a specific user ARN and will create a table containing the source of the user, the region of the activity, the name and type of the event, the action taken, and all the user's identity information.",
"entities": [
"user"
],
"how_to_implement": "You must install the AWS App for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS (version 4.4.0 or later), then configure your CloudTrail inputs.",
"id": "bc91a8cd-35e7-4bb2-6140-e756cc46fd71",
"investigate": {
"splunk": {
"fields_required": [
"user"
],
"schedule": {
"cron_schedule": "0 * * * *",
"earliest_time": "-70m@m",
"latest_time": "-10m@m"
},
"search": "| search sourcetype=aws:cloudtrail userIdentity.arn={user} | table _time userIdentity.type userIdentity.userName userIdentity.arn aws_account_id src awsRegion eventName eventType"
}
},
"maintainers": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
},
{
"company": "Splunk",
"email": "jbrewer@splunk.com",
"name": "Jason Brewer"
}
],
"modification_date": "2019-04-30",
"name": "AWS Investigate User Activities By ARN",
"original_authors": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
}
],
"spec_version": 2,
"type": "splunk",
"version": "2.0"
}