<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pushing self signed certificates to universal forwarders in Security</title>
    <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459404#M10707</link>
    <description>&lt;P&gt;Is there a Splunk recommended solution to pushing self signed SSL certificates to thousands of universal forwarders?&lt;/P&gt;

&lt;P&gt;We tried bundling the certificates into an app and pushing it out to the universal forwarders. However, I believe that the default configurations set in /system/local/ on the universal forwarders will overwrite the configurations set within the app.&lt;/P&gt;

&lt;P&gt;Is there a way around this or is there a better alternative solution? &lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2019 19:41:52 GMT</pubDate>
    <dc:creator>alanzchan</dc:creator>
    <dc:date>2019-05-15T19:41:52Z</dc:date>
    <item>
      <title>Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459404#M10707</link>
      <description>&lt;P&gt;Is there a Splunk recommended solution to pushing self signed SSL certificates to thousands of universal forwarders?&lt;/P&gt;

&lt;P&gt;We tried bundling the certificates into an app and pushing it out to the universal forwarders. However, I believe that the default configurations set in /system/local/ on the universal forwarders will overwrite the configurations set within the app.&lt;/P&gt;

&lt;P&gt;Is there a way around this or is there a better alternative solution? &lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 19:41:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459404#M10707</guid>
      <dc:creator>alanzchan</dc:creator>
      <dc:date>2019-05-15T19:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459405#M10708</link>
      <description>&lt;P&gt;If you have settings in  &lt;CODE&gt;etc/system/local&lt;/CODE&gt; of the UF, then it is almost impossible to override. This is why any enterprise installation should NOT have any items in &lt;CODE&gt;etc/system/local&lt;/CODE&gt;&lt;BR /&gt;
The only way is to use an external tool like puppet/ansible which can do the re-installation for you.&lt;/P&gt;

&lt;P&gt;There is any tricky way to do this (but quite dangerous). The idea is to PUSH an app with python or shell script code, which can delete entries (or do stuff at OS level) an restart splunk. But this is NEVER recommended for enterprise level systems, as you won't have any control if it goes wrong.&lt;/P&gt;

&lt;P&gt;Whatever you did is correct of putting all your TLS/self-signed certificates into an app and manage it centrally and make it part of deployment-server.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 20:36:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459405#M10708</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-15T20:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459406#M10709</link>
      <description>&lt;P&gt;Hi koshyk,&lt;/P&gt;

&lt;P&gt;How I understand SSL, the server.conf and outputs.conf both need to be modified with the correct configurations. Once we accept the license on a UF, a server.conf will automatically be generated. I'm trying to override the /system/local server.conf file that was automatically generated with the server.conf that I have defined in my application. &lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 20:56:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459406#M10709</guid>
      <dc:creator>alanzchan</dc:creator>
      <dc:date>2019-05-15T20:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459407#M10710</link>
      <description>&lt;P&gt;I can't find a way unfortunately other than with help of separate tool or doing the ugly solution as mentioned above&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 21:35:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459407#M10710</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-15T21:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459408#M10711</link>
      <description>&lt;P&gt;In your initial response, are you saying there should be absolutely no settings in /system/local? Not even server.conf? Isn't server.conf automatically generated when you install the universal forwarder and accept the license? Kind of confused here.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 15:13:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459408#M10711</guid>
      <dc:creator>alanzchan</dc:creator>
      <dc:date>2019-05-16T15:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing self signed certificates to universal forwarders</title>
      <link>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459409#M10712</link>
      <description>&lt;P&gt;I meant to say, as splunk admins, we shouldn't put configurations in /system/local. anything which is auto-generated is Okish, as beyond our control.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 12:41:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Pushing-self-signed-certificates-to-universal-forwarders/m-p/459409#M10712</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-17T12:41:35Z</dc:date>
    </item>
  </channel>
</rss>

