<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic F5 Health Monitor of Splunk when Apache sits in front of Splunk for Kerberos Authentication in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/F5-Health-Monitor-of-Splunk-when-Apache-sits-in-front-of-Splunk/m-p/540584#M18571</link>
    <description>&lt;P&gt;This is a pretty specific use case but was difficult to work through.&amp;nbsp; Documenting for future generations.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Feb 2021 21:59:36 GMT</pubDate>
    <dc:creator>ohbuckeyeio</dc:creator>
    <dc:date>2021-02-19T21:59:36Z</dc:date>
    <item>
      <title>F5 Health Monitor of Splunk when Apache sits in front of Splunk for Kerberos Authentication</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/F5-Health-Monitor-of-Splunk-when-Apache-sits-in-front-of-Splunk/m-p/540584#M18571</link>
      <description>&lt;P&gt;This is a pretty specific use case but was difficult to work through.&amp;nbsp; Documenting for future generations.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 21:59:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/F5-Health-Monitor-of-Splunk-when-Apache-sits-in-front-of-Splunk/m-p/540584#M18571</guid>
      <dc:creator>ohbuckeyeio</dc:creator>
      <dc:date>2021-02-19T21:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Health Monitor of Splunk when Apache sits in front of Splunk for Kerberos Authentication</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/F5-Health-Monitor-of-Splunk-when-Apache-sits-in-front-of-Splunk/m-p/540585#M18572</link>
      <description>&lt;P&gt;I have an F5 Health Monitor in place to determine when the Splunk service backed by Apache/Kerberos on a search head has dropped. This will pull those members out of the pool and prevent connections from heading that way.&lt;BR /&gt;&lt;BR /&gt;The changes:&lt;BR /&gt;&lt;BR /&gt;In F5, I created a new health monitor called Splunk_Apache_https_monitor. This monitor sends a HEAD request to the pool members to test the connection. This is the header I built for that HEAD request:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;HEAD / HTTP/1.1\r\nHost:myco.com\r\nUser-agent: MYCO_F5_User_Agent&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;The HTTP 1.1 standard calls for a header that has a host and user-agent directive, but they don’t really have to mean anything in our configuration to pass the check. I made them agnostic with a host of “myco.com” and User-agent of “MYCO_F5_User_Agent” so we know where it’s coming from and can apply it to all the things.&lt;BR /&gt;&lt;BR /&gt;The monitor checks the response from the header request and this regex parses for any service interrupting http status codes that might arise.&lt;BR /&gt;&lt;STRONG&gt;HTTP/1\.[01] [2-4]0[0-6]&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;You can see these F5 requests in the /etc/httpd/logs/splunkweb-access_log.&lt;BR /&gt;&lt;BR /&gt;This is a health check that sees the backend of Splunk is active:&lt;BR /&gt;111.222.333.444 - - [18/Feb/2021:13:47:41 -0800] "HEAD / HTTP/1.1" 303 - "-" "MYCO_F5_User_Agent"&lt;BR /&gt;&lt;BR /&gt;This is a health check that reports Splunk is down, but Apache is running:&lt;BR /&gt;111.222.333.444 - - [18/Feb/2021:13:47:41 -0800] "HEAD / HTTP/1.1" 503 - "-" "MYCO_F5_User_Agent"&lt;BR /&gt;&lt;BR /&gt;On the Splunk side, I modified the /etc/httpd/conf.d/splunkweb.conf file’s &amp;lt;Location “/” &amp;gt; directive to bypass the kerberos request for the F5 IP addresses. See below.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;Location "/"&amp;gt;
ProxyPass https://localhost:8000/
ProxyPassReverse https://localhost:8000/
RequestHeader set Remote-User "%{REMOTE_USER}s"

SSLRequireSSL
AuthType Kerberos
AuthName "Kerberos Login at MYCO.COM"
KrbAuthRealms MYCO.COM
KrbMethodK5Passwd Off
Krb5Keytab "/etc/krb5.keytab"
Require valid-user
KrbMethodNegotiate On
KrbLocalUserMapping On #removes @MYCO.COM from REMOTE_USER

#Only allow users through who provide a kerberos ticket, but igore this rule for F5 IPs
Deny from all
Allow from 111.222.333.444
Satisfy any

&amp;lt;/Location&amp;gt;&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 19 Feb 2021 22:06:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/F5-Health-Monitor-of-Splunk-when-Apache-sits-in-front-of-Splunk/m-p/540585#M18572</guid>
      <dc:creator>ohbuckeyeio</dc:creator>
      <dc:date>2021-02-19T22:06:14Z</dc:date>
    </item>
  </channel>
</rss>

