forked from splunk/security_content
-
Notifications
You must be signed in to change notification settings - Fork 0
/
get_ec2_instance_details_by_instanceid.yml
45 lines (45 loc) · 1.58 KB
/
get_ec2_instance_details_by_instanceid.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
name: Get EC2 Instance Details by instanceId
id: de4aed1d-f13a-4d2f-a97a-73c60e2e6b56
version: 1
date: '2018-02-12'
author: Bhavin Patel, Splunk
type: Investigation
datamodel: []
description: This search queries AWS description logs and returns all the information
about a specific instance via the instanceId field
search: '`aws_description` | dedup id sortby -_time |rename id as instanceId| search
instanceId=$instanceId$ | spath output=tags path=tags | eval tags=mvzip(key,value,"
= "), ip_address=if((ip_address == "null"),private_ip_address,ip_address) | table
id, tags.Name, aws_account_id, placement, instance_type, key_name, ip_address, launch_time,
state, vpc_id, subnet_id, tags | rename aws_account_id as "Account ID", id as ID,
instance_type as Type, ip_address as "IP Address", key_name as "Key Pair", launch_time
as "Launch Time", placement as "Availability Zone", state as State, subnet_id as
Subnet, "tags.Name" as Name, vpc_id as VPC'
how_to_implement: In order to implement this search, you must install the AWS App
for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS(version 4.4.0 or later)
and configure your AWS description inputs.
known_false_positives: ''
references: []
tags:
analytic_story:
- AWS Cryptomining
- Cloud Cryptomining
- Suspicious AWS EC2 Activities
- Unusual AWS EC2 Modifications
- AWS Security Hub Alerts
product:
- Splunk Phantom
required_fields:
- _time
- id
- ip_address
- tags
- aws_account_id
- placement
- instance_type
- key_name
- launch_time
- state
- vpc_id
- subnet_id
security_domain: network