Skip to main content
Splunk Home
LANTERN HOME
  1. Splunk Lantern
  2. Step-by-Step Procedures
  3. Security Monitoring
  4. Monitoring User Activity

Monitoring User Activity

Follow New articles New articles and comments
  • Baseline of domains accessed by network users
  • Kubernetes accounts accessing sensitive objects
  • Kubernetes role-based access control authorizations
  • Kubernetes sensitive roles
  • Kubernetes service accounts with failed or forbidden status
  • Most active Kubernetes service accounts
  • New domains accessed by network users
  • Suspicious kubectl calls
The information provided in Splunk Lantern is intended for informational and educational purposes only. All information is provided in good faith, however, Splunk disclaims any and all representations and warranties, express and implied, regarding the information provided, including without limitation any warranties and representations regarding the completeness, adequacy or accuracy of the information. You agree to take full responsibility for the results arising from the use of the information provided.
Splunk Home LANTERN HOME
  • Facebook
  • Twitter
  • LinkedIn
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.