Skip to content

Commit 1838360

Browse files
committed
add status:deprecated to all investigations
1 parent e42e91e commit 1838360

File tree

47 files changed

+47
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+47
-0
lines changed

investigations/all_backup_logs_for_host.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-12'
55
author: Rico Valdez, Splunk
66
type: Investigation
7+
status: deprecated
78
description: Retrieve the backup logs for the last 2 weeks for a specific host in
89
order to investigate why backups are not completing successfully.
910
search: '| search `netbackup` dest=$dest$'

investigations/amazon_eks_kubernetes_activity_by_src_ip.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-04-13'
55
author: Rod Soto, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search provides investigation data about requests via user agent,
89
authentication request URI, verb and cluster name data against Kubernetes cluster
910
from a specific IP address

investigations/aws_investigate_security_hub_alerts_by_dest.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-06-08'
55
author: Bhavin Patel, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search retrieves the all the alerts created by AWS Security Hub
89
for a specific dest(instance_id).
910
search: '`aws_securityhub_firehose` "findings{}.Resources{}.Type"=AWSEC2Instance |

investigations/aws_investigate_user_activities_by_accesskeyid.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-06-08'
55
author: David Dorsey, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search retrieves the times, ARN, source IPs, AWS regions, event
89
names, and the result of the event for specific credentials.
910
search: '`cloudtrail` | rename userIdentity.accessKeyId as accessKeyId| search accessKeyId=$accessKeyId$

investigations/aws_investigate_user_activities_by_arn.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2019-04-30'
55
author: Bhavin Patel, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search lists all the logged CloudTrail activities by a specific
89
user ARN and will create a table containing the source of the user, the region of
910
the activity, the name and type of the event, the action taken, and all the user's

investigations/aws_network_acl_details_from_id.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-01-22'
55
author: Bhavin Patel, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search queries AWS description logs and returns all the information
89
about a specific network ACL via network ACL ID
910
search: '`aws_description` | rename id as networkAclId | search networkAclId=$networkAclId$

investigations/aws_network_interface_details_via_resourceid.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-05-07'
55
author: Bhavin Patel, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search queries AWS configuration logs and returns the information
89
about a specific network interface via network interface ID. The information will
910
include the ARN of the network interface, its relationships with other AWS resources,

investigations/aws_s3_bucket_details_via_bucketname.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-06-26'
55
author: Bhavin Patel, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search queries AWS configuration logs and returns the information
89
about a specific S3 bucket. The information returned includes the time the S3 bucket
910
was created, the resource ID, the region it belongs to, the value of action performed,

investigations/gcp_kubernetes_activity_by_src_ip.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-04-13'
55
author: Rod Soto, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search provides investigation data about requests via user agent,
89
authentication request URI, resource path and cluster name data against Kubernetes
910
cluster from a specific IP address

investigations/get_all_aws_activity_from_city.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-03-19'
55
author: David Dorsey, Splunk
66
type: Investigation
7+
status: deprecated
78
description: This search retrieves all the activity from a specific city and will
89
create a table containing the time, city, ARN, username, the type of user, the source
910
IP address, the AWS region the activity was in, the API called, and whether or not

0 commit comments

Comments
 (0)