<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to make the deployment server manage all Universal Forwarders' server.conf account for system unique fields like &amp;quot;sslKeysfilePassword ” and “pass4SymmKey”? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-make-the-deployment-server-manage-all-Universal/m-p/241999#M46892</link>
    <description>&lt;P&gt;The goal is to have the deployment server manage server.conf on all Universal Forwarders, like it does with inputs/outputs.conf. Automation is preferred as there are over 300 Windows systems. &lt;/P&gt;

&lt;P&gt;E.g. When we make certificate updates, change the sslVersions, and/or the allowed cipherSuite, we want the deployment server to handle it all.&lt;/P&gt;

&lt;P&gt;This is an issue as the server.conf includes four fields that appear to be unique to &lt;EM&gt;each system&lt;/EM&gt;, and based on our understanding the deployment server updates the whole file, not per stanza:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;sslKeysfilePassword &lt;/LI&gt;
&lt;LI&gt;sslPassword&lt;/LI&gt;
&lt;LI&gt;pass4SymmKey&lt;/LI&gt;
&lt;LI&gt;serverName&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;How do deployment servers handle system unique fields so the deployment server doesn’t just overwrite them and cause configuration issues? Any tips for what direction I need to look in? I would appreciate any help as manually updating all universal forwarders would be insanely time consuming.&lt;/P&gt;

&lt;H4&gt;Here is a scrubbed version of the relevant fields for our deployment server's ~/default/server.conf:&lt;/H4&gt;

&lt;PRE&gt;&lt;CODE&gt;[sslConfig]
enableSplunkdSSL = true
useClientSSLCompression = true
useSplunkdClientSSLCompression = true
# enableSplunkSearchSSL has been moved to web.conf/[settings]/enableSplunkWebSSL

#Allow only sslv3 and above connections to the HTTP server
sslVersions = *,-ssl2
sslVersionsForClient = *,-ssl2
sendStrictTransportSecurityHeader = false
allowSslCompression = true
allowSslRenegotiation = true

# For the HTTP server, Diable ciphers lower than 128-bit and disallow ciphers that
# don't provide authentication and/or encryption.
# Use 'openssl ciphers -v' to generate a list of supported ciphers
# Allow only TLSv1 cipher with 'high' encryption suits, i.e. whose key lengths are
# larger than or equal to 128 bits
cipherSuite = TLSv#+HIGH:TLSv#.2+HIGH:@STRENGTH

serverCert = $SPLUNK_HOME/etc/auth/server.pem
sslPassword = ######
caCertFile = $SPLUNK_HOME/etc/auth/cacert.pem
certCreateScript = $SPLUNK_HOME/bin/splunk, createssl, server-cert
# DEPRECATED
caPath = $SPLUNK_HOME/etc/auth

[applicationsManagement]
updateTimeout = #h
sslVersions = tls#.#
caCertFile = $SPLUNK_HOME/etc/auth/#####.pem
sslVerifyServerCert = true
sslCommonNameToCheck = apps.splunk.com, cdn.apps.splunk.com
sslAltNameToCheck = splunkbase.splunk.com, apps.splunk.com, cdn.apps.splunk.com
cipherSuite = TLSv#+HIGH:@STRENGTH

[clustering]
mode = disabled
pass4SymmKey =
register_replication_address =
register_forwarder_address =
register_search_address =
executor_workers = 10
manual_detention = false

encrypt_fields = "server: :sslKeysfilePassword", "server: :sslPassword", "server: :pass4SymmKey", "server: :password", "outputs:tcpout:sslPassword", "outputs:indexer_discovery:pass4SymmKey", "inputs:SSL:password$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;H4&gt;Here is a scrubbed version belonging to one of the windows systems:&lt;/H4&gt;

&lt;PRE&gt;&lt;CODE&gt;[general]
serverName = &amp;lt;Server Name&amp;gt;
pass4SymmKey = $1$###############

[sslConfig]
sslKeysfilePassword = $###############
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 18 Jan 2017 16:00:49 GMT</pubDate>
    <dc:creator>EdgarAllenProse</dc:creator>
    <dc:date>2017-01-18T16:00:49Z</dc:date>
    <item>
      <title>How to make the deployment server manage all Universal Forwarders' server.conf account for system unique fields like "sslKeysfilePassword ” and “pass4SymmKey”?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-make-the-deployment-server-manage-all-Universal/m-p/241999#M46892</link>
      <description>&lt;P&gt;The goal is to have the deployment server manage server.conf on all Universal Forwarders, like it does with inputs/outputs.conf. Automation is preferred as there are over 300 Windows systems. &lt;/P&gt;

&lt;P&gt;E.g. When we make certificate updates, change the sslVersions, and/or the allowed cipherSuite, we want the deployment server to handle it all.&lt;/P&gt;

&lt;P&gt;This is an issue as the server.conf includes four fields that appear to be unique to &lt;EM&gt;each system&lt;/EM&gt;, and based on our understanding the deployment server updates the whole file, not per stanza:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;sslKeysfilePassword &lt;/LI&gt;
&lt;LI&gt;sslPassword&lt;/LI&gt;
&lt;LI&gt;pass4SymmKey&lt;/LI&gt;
&lt;LI&gt;serverName&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;How do deployment servers handle system unique fields so the deployment server doesn’t just overwrite them and cause configuration issues? Any tips for what direction I need to look in? I would appreciate any help as manually updating all universal forwarders would be insanely time consuming.&lt;/P&gt;

&lt;H4&gt;Here is a scrubbed version of the relevant fields for our deployment server's ~/default/server.conf:&lt;/H4&gt;

&lt;PRE&gt;&lt;CODE&gt;[sslConfig]
enableSplunkdSSL = true
useClientSSLCompression = true
useSplunkdClientSSLCompression = true
# enableSplunkSearchSSL has been moved to web.conf/[settings]/enableSplunkWebSSL

#Allow only sslv3 and above connections to the HTTP server
sslVersions = *,-ssl2
sslVersionsForClient = *,-ssl2
sendStrictTransportSecurityHeader = false
allowSslCompression = true
allowSslRenegotiation = true

# For the HTTP server, Diable ciphers lower than 128-bit and disallow ciphers that
# don't provide authentication and/or encryption.
# Use 'openssl ciphers -v' to generate a list of supported ciphers
# Allow only TLSv1 cipher with 'high' encryption suits, i.e. whose key lengths are
# larger than or equal to 128 bits
cipherSuite = TLSv#+HIGH:TLSv#.2+HIGH:@STRENGTH

serverCert = $SPLUNK_HOME/etc/auth/server.pem
sslPassword = ######
caCertFile = $SPLUNK_HOME/etc/auth/cacert.pem
certCreateScript = $SPLUNK_HOME/bin/splunk, createssl, server-cert
# DEPRECATED
caPath = $SPLUNK_HOME/etc/auth

[applicationsManagement]
updateTimeout = #h
sslVersions = tls#.#
caCertFile = $SPLUNK_HOME/etc/auth/#####.pem
sslVerifyServerCert = true
sslCommonNameToCheck = apps.splunk.com, cdn.apps.splunk.com
sslAltNameToCheck = splunkbase.splunk.com, apps.splunk.com, cdn.apps.splunk.com
cipherSuite = TLSv#+HIGH:@STRENGTH

[clustering]
mode = disabled
pass4SymmKey =
register_replication_address =
register_forwarder_address =
register_search_address =
executor_workers = 10
manual_detention = false

encrypt_fields = "server: :sslKeysfilePassword", "server: :sslPassword", "server: :pass4SymmKey", "server: :password", "outputs:tcpout:sslPassword", "outputs:indexer_discovery:pass4SymmKey", "inputs:SSL:password$
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;H4&gt;Here is a scrubbed version belonging to one of the windows systems:&lt;/H4&gt;

&lt;PRE&gt;&lt;CODE&gt;[general]
serverName = &amp;lt;Server Name&amp;gt;
pass4SymmKey = $1$###############

[sslConfig]
sslKeysfilePassword = $###############
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 18 Jan 2017 16:00:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-make-the-deployment-server-manage-all-Universal/m-p/241999#M46892</guid>
      <dc:creator>EdgarAllenProse</dc:creator>
      <dc:date>2017-01-18T16:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to make the deployment server manage all Universal Forwarders' server.conf account for system unique fields like "sslKeysfilePassword ” and “pass4SymmKey”?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-make-the-deployment-server-manage-all-Universal/m-p/242000#M46893</link>
      <description>&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.1/Admin/Wheretofindtheconfigurationfiles"&gt;Splunk configuration file precedence&lt;/A&gt;  should help explain this concept. I have all the configuration that needs overriding, including that of the server.conf file in an application which drops into $SPLUNK_HOME/etc/apps//...&lt;/P&gt;

&lt;P&gt;You only want to override in the local directory, not the default directory, so just override the fields that you wish to override, for example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[sslConfig]
sslVersions = tls1.2

[general]
site = site0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or similar, you only need to override the parameters that you want overriden. If you wanted to override the pass4SymmKey/sslKeysfilePassword then putting that in an app would work fine &lt;EM&gt;unless&lt;/EM&gt; you have created system/local versions (as per the precedence page linked above).&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 08:08:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-make-the-deployment-server-manage-all-Universal/m-p/242000#M46893</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2017-01-20T08:08:36Z</dc:date>
    </item>
  </channel>
</rss>

