Splunk Cheat Sheet



  1. Use Splunk to generate regular expressions by providing a list of values from the data. Scenario: Extract the first word of each sample phrase from windbag. Step 1, find the samples. Step 2, extract the field.
  2. When you add data to Splunk, Splunk processes it, breaking the data into individual events, timestamps them, and then stores them in an index, so that it can be later searched and analyzed. By default, data you feed to Splunk is stored in the 'main' index, but you can create and specify other indexes for Splunk to use for diff erent data inputs.
Splunk Cheat Sheet

With some well-developed VI skills, it makes it quite easy to configure or reconfigure your Splunk installs, especially those installs such as the Universal Forwarder, which does not have a Splunk Web UI. So here: is the cheat sheet I use. It’s not an all-inclusive cheat sheet, but it covers about 90% of the commands that are available to you. Cheat sheet for splunk search command line. Contribute to xmonster-tech/splunksheet development by creating an account on GitHub.

List active stanzas on Linux forwarder

/opt/splunkforwarder/bin/splunk cmd btool inputs list

List active stanzas and show locations on Linux forwarder

/opt/splunkforwarder/bin/splunk cmd btool inputs list --debug

Add a new log to the on a linux forwarder stanzas ( in this example we add the apache access log )

/opt/splunkforwarder/bin/splunk add monitor /var/log/apache2/zds_access.log -index default -sourcetype access_log

Remove log from stanzas on a linux forwarder ( in this example we add the apache access log )

/opt/splunkforwarder/bin/splunk remove monitor /var/log/apache2/zds_access.log

View all sourcetypes by typing the following to the search field on the splunk console

| metadata type=sourcetypes index=* OR index=_*

In looking into compromised systems, often what is needed by incident responders and investigators is not enabled or configured when it comes to logging. To help get system logs properly Enabled and Configured, below are some cheat sheets to help you do logging well and so the needed data we all need is there when we look.

Cheat Sheets to help you in configuring your systems:

  • The Windows Logging Cheat SheetUpdated Feb 2019

  • The Windows Advanced Logging Cheat SheetUpdated Feb 2019

  • The Windows HUMIO Logging Cheat Sheet Released June 2018

  • The Windows Splunk Logging Cheat Sheet Updated Sept 2019

  • The Windows File Auditing Logging Cheat Sheet Updated Nov 2017

  • The Windows Registry Auditing Logging Cheat Sheet Updated Aug 2019

  • The Windows PowerShell Logging Cheat Sheet Updated Sept 2018

  • The Windows Sysmon Logging Cheat Sheet Updated Jan 2020

MITRE ATT&CK Cheat Sheets

Splunk Cheat Sheet
  • The Windows ATT&CK Logging Cheat Sheet Released Sept 2018

  • The Windows LOG-MD ATT&CK Cheat Sheet Released Sept 2018

The MITRE ATT&CK Logging Cheat Sheets are available in Excel spreadsheet form on the following Github:

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Update Log:

SysmonLCS:Jan 2020 ver 1.1

  • Fixed GB to Kb on log size

WSplunkLCS:Sept 2019 ver 2.22

  • Minor code tweaks, conversion

WSysmonLCS:Aug 2019 ver 1.0

  • Initial release

WRACS:Aug 2019 ver 2.5

  • Added a few more items

WSLCS:Feb 2019 ver 2.21

Splunk Cheat Sheet Github

  • Fixed shifted box, cleanup only

WLCS:Feb 2018 ver 2.3

  • Added a couple items from Advanced

  • Adjust a couple settings

  • General Clean up

  • Referenced the Windows Advanced Logging Cheat Sheet

WALCS: Feb 2019 ver 1.2

  • Updated and added several items

WHLCS:June 2018 ver 1.0

  • Initial release

WFACS: Oct 2016 ver 1.2

  • Added a few new locations

WRACS: oct 2016 ver 1.2

Splunk Queries Cheat Sheet

  • Added many autorun keys

  • Sorted the keys better

WSLCS:Mar 2018 ver 2.1.1

  • Fixed shifted box, cleanup only

WLCS:Jan 2016 ver 2.0

Splunk Cheat Sheet Pdf

  • Added Event code 4720 - New user account created

  • Changed references to File and Registry auditing to point to the new File and Registry auditing Cheat Sheets

  • Expanded info on Command Line Logging

Common Splunk Queries

WRACS: Jan 2016 ver 1.1

Splunk Command Cheat Sheet

  • Sort HKLM Keys

  • Added keys to monitor PowerShell and Command Line log settings

  • Updated HKCU and USERs.DEFAULT info

  • Added info about HKCU unable to be set in Security Templates

  • Added PowerShell script to set HKCU Registry Auditing