<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What kind of things do you view as &amp;quot;bad config&amp;quot;? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594256#M12302</link>
    <description>&lt;P&gt;This is kind of open ended, but essentially I'm looking for things that you view as bad config, or at least configuration settings that should be flagged for review.&lt;BR /&gt;&lt;BR /&gt;Some ideas I've had so far:&lt;BR /&gt;&lt;BR /&gt;- Indexes with a very short retention period (100 seconds or the like)&lt;BR /&gt;- Searches with `index=*` in them&lt;BR /&gt;- A deployment server targeturi that doesn't match the name of your actual DS&lt;BR /&gt;&lt;BR /&gt;What other sorts of config would you flag as concerning? Do you have any automated checks for anything like this in house?&lt;/P&gt;</description>
    <pubDate>Tue, 19 Apr 2022 12:48:44 GMT</pubDate>
    <dc:creator>muebel</dc:creator>
    <dc:date>2022-04-19T12:48:44Z</dc:date>
    <item>
      <title>What kind of things do you view as "bad config"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594256#M12302</link>
      <description>&lt;P&gt;This is kind of open ended, but essentially I'm looking for things that you view as bad config, or at least configuration settings that should be flagged for review.&lt;BR /&gt;&lt;BR /&gt;Some ideas I've had so far:&lt;BR /&gt;&lt;BR /&gt;- Indexes with a very short retention period (100 seconds or the like)&lt;BR /&gt;- Searches with `index=*` in them&lt;BR /&gt;- A deployment server targeturi that doesn't match the name of your actual DS&lt;BR /&gt;&lt;BR /&gt;What other sorts of config would you flag as concerning? Do you have any automated checks for anything like this in house?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 12:48:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594256#M12302</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2022-04-19T12:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of things do you view as "bad config"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594260#M12304</link>
      <description>&lt;P&gt;Something that always catches my attention, and requires review:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[default]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the default stanza&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 12:54:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594260#M12304</guid>
      <dc:creator>TRex</dc:creator>
      <dc:date>2022-04-19T12:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of things do you view as "bad config"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594263#M12305</link>
      <description>&lt;P&gt;ah yeah. Seems like it might be appropriate in some settings. Are there config files where it's particularly egregious?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 12:58:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594263#M12305</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2022-04-19T12:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of things do you view as "bad config"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594893#M12359</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;some other issues which I always try to avoid/fix&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;indexes.conf without volumes&lt;/LI&gt;&lt;LI&gt;KO stored under search app&lt;/LI&gt;&lt;LI&gt;No naming policy for Splunk KOs&lt;/LI&gt;&lt;LI&gt;use system/local instead of separate apps for local configurations&lt;/LI&gt;&lt;LI&gt;non indexer layer nodes without internal log forwarding to indexers&lt;/LI&gt;&lt;LI&gt;no MC installed / configured&lt;/LI&gt;&lt;LI&gt;no email configured&lt;/LI&gt;&lt;LI&gt;no kvstore backups&lt;/LI&gt;&lt;LI&gt;no own Splunk Apps for different groups/business apps&lt;/LI&gt;&lt;LI&gt;no separate test/prod environments&lt;/LI&gt;&lt;LI&gt;no index / sourcetype policies&lt;/LI&gt;&lt;LI&gt;no source system integration catalog from where you could see what and why you have stuff and to whom contact based on issues&lt;/LI&gt;&lt;LI&gt;IPs have used instead of FQDN, use always at least meaningful CNAME for all nodes&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Definitely there are a lot more items, here was what comes my mind without thinking.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 15:14:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594893#M12359</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2022-04-22T15:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of things do you view as "bad config"?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594914#M12360</link>
      <description>&lt;P&gt;TLS certs issued to IP addresses&lt;/P&gt;&lt;P&gt;"Sharing" certs among multiple clients (multiple servers too but I can find legitimate use cases for it).&lt;/P&gt;&lt;P&gt;All scheduled searches with the same schedule.&lt;/P&gt;&lt;P&gt;No sound method of source health monitoring (that's more of an organizational/policy issue than config but some internal splunk-based automation would surely be helpful here).&lt;/P&gt;&lt;P&gt;Searches with tons of rex commands (create the extractions already!).&lt;/P&gt;&lt;P&gt;Abuse of append in searches (usualy by users "extending" old searches in dashboards without really understanding SPL).&lt;/P&gt;&lt;P&gt;Searches with eval _time=something. Often that's a badly onboarded source (but can be legit use case so it's up for review, not necessarily automatic red flag).&lt;/P&gt;&lt;P&gt;Using obsolete tls version and/or weak cipher suites.&lt;/P&gt;&lt;P&gt;Using default certs when tls is enabled.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 17:10:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/What-kind-of-things-do-you-view-as-quot-bad-config-quot/m-p/594914#M12360</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-04-22T17:10:11Z</dc:date>
    </item>
  </channel>
</rss>

