Name:Kubernetes GCP detect most active service accounts by pod id:7f5c2779-88a0-4824-9caa-0f606c8f260f version:4 date:2024-11-14 author:Rod Soto, Splunk status:deprecated type:Hunting Description:This search provides information on Kubernetes service accounts,accessing pods by IP address, verb and decision Data_source:
how_to_implement:You must install splunk GCP add on. This search works with pubsub messaging service logs known_false_positives:Not all service accounts interactions are malicious. Analyst must consider IP, verb and decision context when trying to detect maliciousness. References: drilldown_searches:
: tags: analytic_story: - 'Kubernetes Sensitive Role Activity' asset_type:GCP GKE Kubernetes cluster product: - 'Splunk Enterprise' - 'Splunk Enterprise Security' - 'Splunk Cloud' security_domain:threat