splunk / splunk.es / 3.0.0 / module / splunk_adaptive_response_notable_events Manage Adaptive Responses notable events resource module | "added in version" 2.1.0 of splunk.es" Authors: Ansible Security Automation Team (@pranav-bhatt) <https://github.com/ansible-security> This plugin has a corresponding action plugin.splunk.es.splunk_adaptive_response_notable_events (3.0.0) — module
Install with ansible-galaxy collection install splunk.es:==3.0.0
collections: - name: splunk.es version: 3.0.0
This module allows for creation, deletion, and modification of Splunk Enterprise Security Notable Event Adaptive Responses that are associated with a correlation search
Tested against Splunk Enterprise Server 8.2.3
# Using gathered # -------------- - name: Gather adaptive response notable events config splunk.es.splunk_adaptive_response_notable_events: config: - correlation_search_name: Ansible Test - correlation_search_name: Ansible Test 2 state: gathered
# RUN output: # ----------- # "gathered": [ # { # "correlation_search_name": "Ansible Test", # "description": "test notable event", # "drilldown_earliest_offset": "$info_min_time$", # "drilldown_latest_offset": "$info_max_time$", # "drilldown_name": "test_drill_name", # "drilldown_search": "test_drill", # "extract_artifacts": { # "asset": [ # "src", # "dest", # "dvc", # "orig_host" # ], # "identity": [ # "src_user", # "user", # "src_user_id", # "src_user_role", # "user_id", # "user_role", # "vendor_account" # ] # }, # "investigation_profiles": [ # "test profile 1", # "test profile 2", # "test profile 3" # ], # "next_steps": [ # "makestreams", # "nbtstat", # "nslookup" # ], # "name": "ansible_test_notable", # "recommended_actions": [ # "email", # "logevent", # "makestreams", # "nbtstat" # ], # "security_domain": "threat", # "severity": "high" # }, # { } # there is no configuration associated with "/var" # ] # Using merged # ------------ - name: Example to add config splunk.es.splunk_adaptive_response_notable_events: config: - correlation_search_name: Ansible Test description: test notable event drilldown_earliest_offset: $info_min_time$ drilldown_latest_offset: $info_max_time$ extract_artifacts: asset: - src - dest identity: - src_user - user - src_user_id next_steps: - makestreams name: ansible_test_notable recommended_actions: - email - logevent security_domain: threat severity: high state: merged
# RUN output: # ----------- # "after": [ # { # "correlation_search_name": "Ansible Test", # "description": "test notable event", # "drilldown_earliest_offset": "$info_min_time$", # "drilldown_latest_offset": "$info_max_time$", # "drilldown_name": "test_drill_name", # "drilldown_search": "test_drill", # "extract_artifacts": { # "asset": [ # "src", # "dest", # "dvc", # "orig_host" # ], # "identity": [ # "src_user", # "user", # "src_user_id", # "src_user_role", # "user_id", # "user_role", # "vendor_account" # ] # }, # "investigation_profiles": [ # "test profile 1", # "test profile 2", # "test profile 3" # ], # "next_steps": [ # "makestreams", # "nbtstat", # "nslookup" # ], # "name": "ansible_test_notable", # "recommended_actions": [ # "email", # "logevent", # "makestreams", # "nbtstat" # ], # "security_domain": "threat", # "severity": "high" # } # ], # "before": [], # Using replaced # -------------- - name: Example to Replace the config splunk.es.splunk_adaptive_response_notable_events: config: - correlation_search_name: Ansible Test description: test notable event drilldown_earliest_offset: $info_min_time$ drilldown_latest_offset: $info_max_time$ extract_artifacts: asset: - src - dest identity: - src_user - user - src_user_id next_steps: - makestreams name: ansible_test_notable recommended_actions: - email - logevent security_domain: threat severity: high state: replaced
# RUN output: # ----------- # "after": [ # { # "correlation_search_name": "Ansible Test", # "description": "test notable event", # "drilldown_earliest_offset": "$info_min_time$", # "drilldown_latest_offset": "$info_max_time$", # "extract_artifacts": { # "asset": [ # "src", # "dest" # ], # "identity": [ # "src_user", # "user", # "src_user_id" # ] # }, # "next_steps": [ # "makestreams" # ], # "name": "ansible_test_notable", # "recommended_actions": [ # "email", # "logevent" # ], # "security_domain": "threat", # "severity": "high" # } # ], # "before": [ # { # "correlation_search_name": "Ansible Test", # "description": "test notable event", # "drilldown_earliest_offset": "$info_min_time$", # "drilldown_latest_offset": "$info_max_time$", # "drilldown_name": "test_drill_name", # "drilldown_search": "test_drill", # "extract_artifacts": { # "asset": [ # "src", # "dest", # "dvc", # "orig_host" # ], # "identity": [ # "src_user", # "user", # "src_user_id", # "src_user_role", # "user_id", # "user_role", # "vendor_account" # ] # }, # "investigation_profiles": [ # "test profile 1", # "test profile 2", # "test profile 3" # ], # "next_steps": [ # "makestreams", # "nbtstat", # "nslookup" # ], # "name": "ansible_test_notable", # "recommended_actions": [ # "email", # "logevent", # "makestreams", # "nbtstat" # ], # "security_domain": "threat", # "severity": "high" # } # ], # USING DELETED # ------------- - name: Example to remove the config splunk.es.splunk_adaptive_response_notable_events: config: - correlation_search_name: Ansible Test state: deleted
state: choices: - merged - replaced - deleted - gathered default: merged description: - The state the configuration should be left in type: str config: description: - Configure file and directory monitoring on the system elements: dict suboptions: correlation_search_name: description: - Name of correlation search to associate this notable event adaptive response with required: true type: str default_owner: description: - Default owner of the notable event, if unset it will default to Splunk System Defaults type: str default_status: choices: - unassigned - new - in progress - pending - resolved - closed description: - Default status of the notable event, if unset it will default to Splunk System Defaults type: str description: description: - Description of the notable event, this will populate the description field for the web console type: str drilldown_earliest_offset: default: $info_min_time$ description: - Set the amount of time before the triggering event to search for related events. For example, 2h. Use '$info_min_time$' to set the drill-down time to match the earliest time of the search type: str drilldown_latest_offset: default: $info_max_time$ description: - Set the amount of time after the triggering event to search for related events. For example, 1m. Use '$info_max_time$' to set the drill-down time to match the latest time of the search type: str drilldown_name: description: - Name for drill down search, Supports variable substitution with fields from the matching event. type: str drilldown_search: description: - Drill down search, Supports variable substitution with fields from the matching event. type: str extract_artifacts: description: - Assets and identities to be extracted suboptions: asset: choices: - src - dest - dvc - orig_host description: - list of assets to extract, select any one or many of the available choices - defaults to all available choices elements: str type: list file: description: - list of files to extract elements: str type: list identity: choices: - user - src_user - src_user_id - user_id - src_user_role - user_role - vendor_account description: - list of identity fields to extract, select any one or many of the available choices - defaults to 'user' and 'src_user' elements: str type: list url: description: - list of URLs to extract elements: str type: list type: dict investigation_profiles: description: - Investigation profile to associate the notable event with. elements: str type: list name: description: - Name of notable event type: str next_steps: description: - List of adaptive responses that should be run next - Describe next steps and response actions that an analyst could take to address this threat. elements: str type: list recommended_actions: description: - List of adaptive responses that are recommended to be run next - Identifying Recommended Adaptive Responses will highlight those actions for the analyst when looking at the list of response actions available, making it easier to find them among the longer list of available actions. elements: str type: list security_domain: choices: - access - endpoint - network - threat - identity - audit default: threat description: - Splunk Security Domain type: str severity: choices: - informational - low - medium - high - critical - unknown default: high description: - Severity rating type: str type: list running_config: description: - The module, by default, will connect to the remote device and retrieve the current running-config to use as a base for comparing against the contents of source. There are times when it is not desirable to have the task get the current running-config for every task in a playbook. The I(running_config) argument allows the implementer to pass in the configuration to use as the base config for comparison. This value of this option should be the output received from device by executing command. type: str
after: description: The configuration as structured data after module completion. returned: when changed sample: The configuration returned will always be in the same format of the parameters above. type: list before: description: The configuration as structured data prior to module invocation. returned: always sample: The configuration returned will always be in the same format of the parameters above. type: list gathered: description: Facts about the network resource gathered from the remote device as structured data. returned: when state is I(gathered) sample: 'This output will always be in the same format as the module argspec. ' type: dict