<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP tuning 4.2 in Security</title>
    <link>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105259#M3369</link>
    <description>&lt;P&gt;This is interesting.&lt;/P&gt;</description>
    <pubDate>Sat, 21 May 2011 17:28:38 GMT</pubDate>
    <dc:creator>gkanapathy</dc:creator>
    <dc:date>2011-05-21T17:28:38Z</dc:date>
    <item>
      <title>LDAP tuning 4.2</title>
      <link>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105257#M3367</link>
      <description>&lt;P&gt;I have set up LDAP access to the GC (3268) and it works great.  However, i am now noticing that there is a lot of traffic generated across the firewall that separates them.&lt;BR /&gt;
in the last 60 minutes 54,000 connections were created.  This will not make the AD team very happy.&lt;/P&gt;

&lt;P&gt;Firstly what is splunk doing every minute to reach out and generate about 1000 connections ( this sounds like the default page size for an ldap connection)?&lt;/P&gt;

&lt;P&gt;Second how do I force splunk to reach out less frequently?  The LDAP groups are not changing that rapidly, once an hour or two is sufficient for me.  &lt;/P&gt;

&lt;P&gt;Can the scripted auth parameters for caching and timeout be used for LDAP connections?&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2011 12:11:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105257#M3367</guid>
      <dc:creator>EricPartington</dc:creator>
      <dc:date>2011-05-19T12:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP tuning 4.2</title>
      <link>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105258#M3368</link>
      <description>&lt;P&gt;Solved it, wasnt what I expected.&lt;/P&gt;

&lt;P&gt;We are using LDAP auth for user access to splunk.  It turns out that splunk attempts to verify in LDAP all the owners of searches and objects listed in local.meta&lt;/P&gt;

&lt;P&gt;I had done some development on objects with a local account that didnt exist on this server and that was what splunk was attempting to lookup in AD.  This is the same behaviour that I saw when i used the Bind app and we were noticing lookups for nfoggi (the creator of the searches in that app).&lt;/P&gt;

&lt;P&gt;So i guess a word of warning, if you save objects as owned by a local user that does not exist on the splunk server that authentication is done on, you will have a number of queries generated to your AD/LDAP server attempting to lookup those ID's.&lt;/P&gt;

&lt;P&gt;A tcpdump with this string will tell you what you are looking up in AD/LDAP to validate the problem.&lt;BR /&gt;
a.b.c.d is th eldap server or you can use port 3268 (for global catalog) or port 386 (for LDAP).&lt;BR /&gt;
tcpdump -np -s 1500 -w outfile.libpcap -i em3 host a.b.c.d&lt;/P&gt;

&lt;P&gt;hope this helps someone (and maybe gets the default ownership of objects changed in splunkbase for those that use AD/LDAP auth).&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2011 18:39:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105258#M3368</guid>
      <dc:creator>EricPartington</dc:creator>
      <dc:date>2011-05-20T18:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP tuning 4.2</title>
      <link>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105259#M3369</link>
      <description>&lt;P&gt;This is interesting.&lt;/P&gt;</description>
      <pubDate>Sat, 21 May 2011 17:28:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/LDAP-tuning-4-2/m-p/105259#M3369</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2011-05-21T17:28:38Z</dc:date>
    </item>
  </channel>
</rss>

