<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenticated TCP Input? in Security</title>
    <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131651#M3997</link>
    <description>&lt;P&gt;As an alternative to building your own authenticated TCP input you could use the existing Splunk REST API endpoints: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fsimple"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fsimple&lt;/A&gt; for single events, &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fstream"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fstream&lt;/A&gt; for streamed events.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Apr 2014 08:20:00 GMT</pubDate>
    <dc:creator>martin_mueller</dc:creator>
    <dc:date>2014-04-15T08:20:00Z</dc:date>
    <item>
      <title>Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131649#M3995</link>
      <description>&lt;P&gt;I have set up a TCP input and have noticed that it is completely open by default. (For example if I hit that port from a web browser, it interprets the HTTP request as an event to be ingested). I need to be able to prevent arbitrary garbage from being ingested.&lt;/P&gt;

&lt;P&gt;I see in the docs that it is possible to lock down the import to specific hosts or IP addresses, but I need to be able to support data ingestion from anywhere. What I really need is some form of authentication on the input.&lt;/P&gt;

&lt;P&gt;Is this possible with TCP inputs?&lt;/P&gt;

&lt;P&gt;If not, I assume I would need to build my own authenticated TCP interface and then stream the data from that to Splunk. Is this a good approach? What is the best way to stream the data? Some sort of persistent queue?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:35:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131649#M3995</guid>
      <dc:creator>pezcrap</dc:creator>
      <dc:date>2014-04-15T00:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131650#M3996</link>
      <description>&lt;P&gt;What about using something like IPSEC between the hosts? Setting up an &lt;A href="http://support.microsoft.com/kb/816514"&gt;IPSEC policy on Windows&lt;/A&gt; is particularly simple. You can configure the policy such that it only allows communication on the given port if it is authenticated and secured.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:18:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131650#M3996</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2014-04-15T04:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131651#M3997</link>
      <description>&lt;P&gt;As an alternative to building your own authenticated TCP input you could use the existing Splunk REST API endpoints: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fsimple"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fsimple&lt;/A&gt; for single events, &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fstream"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.3/RESTAPI/RESTinput#receivers.2Fstream&lt;/A&gt; for streamed events.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 08:20:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131651#M3997</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-04-15T08:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131652#M3998</link>
      <description>&lt;P&gt;Hi martin - that streamed events receiver looks useful. Is this exposed via the Java SDK? (I can't seem to find it) or it it necessary to hit the REST API directly?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 02:29:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131652#M3998</guid>
      <dc:creator>pezcrap</dc:creator>
      <dc:date>2014-04-17T02:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131653#M3999</link>
      <description>&lt;P&gt;Not quite sure about the regular SDK, however if you're already working in Java you should take a look at &lt;A href="https://github.com/damiendallimore/SplunkJavaLogging"&gt;https://github.com/damiendallimore/SplunkJavaLogging&lt;/A&gt; for logging directly to Splunk. On top of logging via TCP that comes with an implementation of logging to the authenticated REST API.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 07:13:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131653#M3999</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-04-17T07:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticated TCP Input?</title>
      <link>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131654#M4000</link>
      <description>&lt;P&gt;So I think that there are couple of ways to address this.&lt;BR /&gt;
1) If your fowarding system is non-splunk: By writing a small proxy. You could spawn a small multi threaded TCP server (in python for ease), and then have some form of authentication of forwarders, as a handshake step after connection is established. After handshake is done you can just blindly start forwarding data to the tcpinput port.&lt;BR /&gt;
2) If you forwarding system is Splunk based: There is a mechanism of setting up shared secret keys between forwarding an receiving side. You can do this by &lt;A href="https://docs.splunk.com/Documentation/Forwarder/6.4.2/Forwarder/Controlforwarderaccess#Configure_the_indexer_with_the_token"&gt;https://docs.splunk.com/Documentation/Forwarder/6.4.2/Forwarder/Controlforwarderaccess#Configure_the_indexer_with_the_token&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Aug 2016 00:19:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenticated-TCP-Input/m-p/131654#M4000</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-08-20T00:19:57Z</dc:date>
    </item>
  </channel>
</rss>

