Skip to content

Commit 61d31bd

Browse files
committed
Add status deprecated/production to all stories and baselines as appropriate
1 parent 1f5975b commit 61d31bd

File tree

335 files changed

+335
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

335 files changed

+335
-0
lines changed

baselines/baseline_of_blocked_outbound_traffic_from_aws.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-05-07'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search establishes, on a per-hour basis, the average and the standard
89
deviation of the number of outbound connections blocked in your VPC flow logs by
910
each source IP address (IP address of your EC2 instances). Also recorded is the

baselines/baseline_of_cloud_infrastructure_api_calls_per_user.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-07'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many API calls are performed by each user. By default, the search uses the
910
last 90 days of data to build the model and the model is rebuilt weekly. The model

baselines/baseline_of_cloud_instances_destroyed.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-25'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many instances are destroyed in the environment. By default, the search
910
uses the last 90 days of data to build the model and the model is rebuilt weekly.

baselines/baseline_of_cloud_instances_launched.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-14'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many instances are created in the environment. By default, the search uses
910
the last 90 days of data to build the model and the model is rebuilt weekly. The

baselines/baseline_of_cloud_security_group_api_calls_per_user.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-07'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many API calls for security groups are performed by each user. By default,
910
the search uses the last 90 days of data to build the model and the model is rebuilt

baselines/baseline_of_command_line_length___mltk.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-05-08'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
to characterize the length of the command lines observed for each user in the environment.
910
By default, the search uses the last 30 days of data to build the model. The model

baselines/baseline_of_dns_query_length___mltk.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-05-08'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
to characterize the length of the DNS queries for each DNS record type observed
910
in the environment. By default, the search uses the last 30 days of data to build

baselines/baseline_of_kubernetes_container_network_io.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 4
44
date: '2024-09-24'
55
author: Matthew Moore, Splunk
66
type: Baseline
7+
status: production
78
description: This baseline rule calculates the average and standard deviation of inbound
89
and outbound network IO for each Kubernetes container. It uses metrics from the
910
Kubernetes API and the Splunk Infrastructure Monitoring Add-on. The rule generates

baselines/baseline_of_kubernetes_container_network_io_ratio.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2024-09-24'
55
author: Matthew Moore, Splunk
66
type: Baseline
7+
status: production
78
description: This baseline rule calculates the average ratio of inbound to outbound
89
network IO for each Kubernetes container. It uses metrics from the Kubernetes API
910
and the Splunk Infrastructure Monitoring Add-on. The rule generates a lookup table

baselines/baseline_of_kubernetes_process_resource.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2023-12-18'
55
author: Matthew Moore, Splunk
66
type: Baseline
7+
status: production
78
description: This baseline rule calculates the average and standard deviation of various
89
process resources in a Kubernetes environment. It uses metrics from the Kubernetes
910
API and the Splunk Infrastructure Monitoring Add-on. The rule generates a lookup

baselines/baseline_of_kubernetes_process_resource_ratio.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2024-09-24'
55
author: Matthew Moore, Splunk
66
type: Baseline
7+
status: production
78
description: This baseline rule calculates the average and standard deviation of the
89
ratio of various process resources in a Kubernetes environment. It uses metrics
910
from the Kubernetes API and the Splunk Infrastructure Monitoring Add-on. The rule

baselines/baseline_of_network_acl_activity_by_arn.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-05-21'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search establishes, on a per-hour basis, the average and the standard
89
deviation of the number of API calls that were related to network ACLs made by each
910
user. Also recorded is the number of data points for each user. This table is then

baselines/baseline_of_s3_bucket_deletion_activity_by_arn.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-07-17'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search establishes, on a per-hour basis, the average and standard
89
deviation for the number of API calls related to deleting an S3 bucket by each user.
910
Also recorded is the number of data points for each user. This table is then outputted

baselines/baseline_of_security_group_activity_by_arn.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-04-17'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search establishes, on a per-hour basis, the average and the standard
89
deviation for the number of API calls related to security groups made by each user.
910
Also recorded is the number of data points for each user. This table is then outputted

baselines/baseline_of_smb_traffic___mltk.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-05-08'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
to characterize the number of SMB connections observed each hour for every day of
910
week. By default, the search uses the last 30 days of data to build the model. The

baselines/count_of_assets_by_category.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-13'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search shows you every asset category you have and the assets that
89
belong to those categories.
910
search: '| from datamodel Identity_Management.All_Assets | stats count values(nt_host)

baselines/count_of_unique_ips_connecting_to_ports.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-13'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: The search counts the number of times a connection was observed to each
89
destination port, and the number of unique source IPs connecting to them.
910
search: '| tstats `security_content_summariesonly` count dc(All_Traffic.src) as numberOfUniqueHosts

baselines/create_a_list_of_approved_aws_service_accounts.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2018-12-03'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search looks for successful API activity in CloudTrail within the
89
last 30 days, filters out known users from the identity table, and outputs values
910
of users into `aws_service_accounts.csv` lookup file.

baselines/deprecated/add_prohibited_processes_to_enterprise_security.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-15'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search takes the existing interesting process table from ES, filters
89
out any existing additions added by ESCU and then updates the table with processes
910
identified by ESCU that should be prohibited on your endpoints.

baselines/deprecated/baseline_of_api_calls_per_user_arn.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-04-09'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search establishes, on a per-hour basis, the average and the standard
89
deviation of the number of API calls made by each user. Also recorded is the number
910
of data points for each user. This table is then outputted to a lookup file to allow

baselines/deprecated/baseline_of_excessive_aws_instances_launched_by_user___mltk.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-11-14'
55
author: Jason Brewer, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many RunInstances users do in the environment. By default, the search uses
910
the last 90 days of data to build the model. The model created by this search is

baselines/deprecated/baseline_of_excessive_aws_instances_terminated_by_user___mltk.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-11-14'
55
author: Jason Brewer, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search is used to build a Machine Learning Toolkit (MLTK) model
89
for how many TerminateInstances users do in the environment. By default, the search
910
uses the last 90 days of data to build the model. The model created by this search

baselines/deprecated/previously_seen_api_call_per_user_roles_in_cloudtrail.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-04-16'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search looks for successful API calls made by different user roles,
89
then creates a baseline of the earliest and latest times we have encountered this
910
user role. It also returns the name of the API call in our dataset--grouped by user

baselines/deprecated/previously_seen_aws_provisioning_activity_sources.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-03-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search builds a table of the first and last times seen for every
89
IP address (along with its physical location) previously associated with cloud-provisioning
910
activity. This is broadly defined as any event that runs or creates something.

baselines/deprecated/previously_seen_ec2_amis.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search builds a table of previously seen AMIs used to launch EC2
89
instances
910
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename requestParameters.instancesSet.items{}.imageId

baselines/deprecated/previously_seen_ec2_instance_types.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search builds a table of previously seen EC2 instance types
89
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename requestParameters.instanceType
910
as instanceType | fillnull value="m1.small" instanceType | stats earliest(_time)

baselines/deprecated/previously_seen_ec2_launches_by_user.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search builds a table of previously seen ARNs that have launched
89
a EC2 instance.
910
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename userIdentity.arn

baselines/deprecated/previously_seen_users_in_cloudtrail.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-04-30'
55
author: Jason Brewer, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search looks for CloudTrail events where a user logs into the console,
89
then creates a baseline of the latest and earliest times, City, Region, and Country
910
we have encountered this user in our dataset, grouped by ARN, within the last 30

baselines/deprecated/update_previously_seen_users_in_cloudtrail.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: Jason Brewer, Splunk
66
type: Baseline
7+
status: deprecated
78
description: This search looks for CloudTrail events where a user logs into the console,
89
then updates the baseline of the latest and earliest times, City, Region, and Country
910
we have encountered this user in our dataset, grouped by ARN, within the last hour.

baselines/discover_dns_records.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2025-01-16'
55
author: Jose Hernandez, Splunk
66
type: Baseline
7+
status: production
78
description: The search takes corporate and common cloud provider domains configured
89
under `cim_corporate_email_domains.csv`, `cim_corporate_web_domains.csv`, and `cloud_domains.csv`
910
finds their responses across the last 30 days from data in the `Network_Resolution

baselines/dnstwist_domain_names.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 2
44
date: '2018-10-08'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search creates permutations of your existing domains, removes the
89
valid domain names and stores them in a specified lookup file so they can be checked
910
for in the associated detection searches.

baselines/identify_systems_creating_remote_desktop_traffic.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-15'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search counts the numbers of times the system has generated remote
89
desktop traffic.
910
search: '| tstats `security_content_summariesonly` count from datamodel=Network_Traffic

baselines/identify_systems_receiving_remote_desktop_traffic.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-15'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search counts the numbers of times the system has created remote
89
desktop traffic
910
search: '| tstats `security_content_summariesonly` count from datamodel=Network_Traffic

baselines/identify_systems_using_remote_desktop.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2019-04-01'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search counts the numbers of times the remote desktop process, mstsc.exe,
89
has run on each system.
910
search: '| tstats `security_content_summariesonly` count from datamodel=Endpoint.Processes

baselines/monitor_successful_backups.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-12'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is intended to give you a feel for how often successful backups
89
are conducted in your environment. Fluctuations in these numbers will allow you
910
to determine when you should investigate.

baselines/monitor_unsuccessful_backups.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2017-09-12'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search is intended to give you a feel for how often backup failures
89
happen in your environments. Fluctuations in these numbers will allow you to determine
910
when you should investigate.

baselines/previously_seen_aws_cross_account_activity.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-06-04'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search looks for **AssumeRole** events where the requesting account
89
differs from the requested account, then writes these relationships to a lookup
910
file.

baselines/previously_seen_aws_cross_account_activity___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search looks for **AssumeRole** events where the requesting account
89
differs from the requested account, then writes these relationships to a lookup
910
file.

baselines/previously_seen_aws_cross_account_activity___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search looks for **AssumeRole** events where the requesting account
89
differs from the requested account, then writes these relationships to a lookup
910
file.

baselines/previously_seen_aws_regions.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2018-01-08'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7+
status: production
78
description: This search looks for CloudTrail events where an AWS instance is started
89
and creates a baseline of most recent time (latest) and the first time (earliest)
910
we've seen this region in our dataset grouped by the value awsRegion for the last

baselines/previously_seen_cloud_api_calls_per_user_role___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-03'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of the first and last times seen for every
89
user role and command combination. This is broadly defined as any event that runs
910
or creates something. This table is then cached.

baselines/previously_seen_cloud_api_calls_per_user_role___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-03'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search updates the table of the first and last times seen for every
89
user role and command combination.
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_creations_by_user___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen users that have launched
89
a cloud compute instance.
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_creations_by_user___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen users that have launched
89
a cloud compute instance.
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_images___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-10-08'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen images used to launch cloud
89
compute instances
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_images___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-08-12'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen images used to launch cloud
89
compute instances
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_instance_types___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-03'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen cloud compute instance
89
types
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_compute_instance_types___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-09-03'
55
author: David Dorsey, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen cloud compute instance
89
types
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_instance_modifications_by_user___initial.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-07-29'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search builds a table of previously seen users that have modified
89
a cloud instance.
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

baselines/previously_seen_cloud_instance_modifications_by_user___update.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ version: 1
44
date: '2020-07-29'
55
author: Rico Valdez, Splunk
66
type: Baseline
7+
status: production
78
description: This search updates a table of previously seen Cloud Instance modifications
89
that have been made by a user
910
search: '| tstats earliest(_time) as firstTimeSeen, latest(_time) as lastTimeSeen

0 commit comments

Comments
 (0)