<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Installing Enterprise Security app in a distributed environment in Installation</title>
    <link>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211267#M10084</link>
    <description>&lt;P&gt;First of all you should install Enterprise Security on the Search Head and choose add-ons which you need, &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;then configure add-on pack in via Enterprise Security &lt;/LI&gt;
&lt;LI&gt;then download it and add to cluster master &lt;/LI&gt;
&lt;LI&gt;then push configuration to indexers&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Whole process is described in this article:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/ES/5.0.0/Install/InstallTechnologyAdd-ons"&gt;http://docs.splunk.com/Documentation/ES/5.0.0/Install/InstallTechnologyAdd-ons&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Apr 2018 15:25:47 GMT</pubDate>
    <dc:creator>skulk</dc:creator>
    <dc:date>2018-04-05T15:25:47Z</dc:date>
    <item>
      <title>Installing Enterprise Security app in a distributed environment</title>
      <link>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211265#M10082</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
we are deploying Enterprise Security App. over distributed Environment (2 indexers, 1 master and 1 search head).&lt;/P&gt;

&lt;P&gt;Should the security app be installed over all instances or over the search head only ?!&lt;/P&gt;

&lt;P&gt;Also, what are source types supported by the security app ?!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 11:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211265#M10082</guid>
      <dc:creator>samehatef</dc:creator>
      <dc:date>2015-12-30T11:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Installing Enterprise Security app in a distributed environment</title>
      <link>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211266#M10083</link>
      <description>&lt;P&gt;Well. &lt;BR /&gt;
I am using Splunk 6.2 and Cisco Security Suite version 3.0.3  build 100784.&lt;BR /&gt;
An Universal Forwarder for sending the network logging data to the Forwarder&lt;BR /&gt;
A Forwarder to receive the data &lt;BR /&gt;
A Master/License node for my cluster.&lt;BR /&gt;
An Deployment node to deploy the configurations onto the UFW, FW, SH. &lt;BR /&gt;
Two Indexers (Cluster Peers) &lt;BR /&gt;
One Search Head. &lt;BR /&gt;
My configuration files (All Apps)  deployed by the Deployment server (except those for the cluster peers ) &lt;/P&gt;

&lt;P&gt;App 1. inputs for the Universal Forwarder to define which logs and their sourcetypes:&lt;BR /&gt;
     sourcetype = cisco:asa&lt;BR /&gt;
     sourcetype = cisco:esa&lt;BR /&gt;
    sourcetype = cisco:ios&lt;BR /&gt;
    sourcetype = cisco:wsa:squid&lt;BR /&gt;
App 2. outputs for the Universal Forwarder to define the route to the forwarder:&lt;BR /&gt;
     [tcpout:to-fwdr-p]&lt;BR /&gt;
     server = 192.168.230.20:10300&lt;BR /&gt;
     [tcpout-server://192.168.230.20:10300]&lt;BR /&gt;
     useACK = true&lt;BR /&gt;
App 3. inputs on the Forwarder to define the input from the Universal Forwarder:&lt;BR /&gt;
    [splunktcp://10300]&lt;BR /&gt;
    connection_host = ip&lt;BR /&gt;
App 4. Outputs on the Forwarder to define the route to the Indexers&lt;BR /&gt;
     server = 192.168.230.21:9991, 192.168.230.23:9992&lt;BR /&gt;
     [tcpout-server://192.168.230.21:9991]&lt;BR /&gt;
     useACK = true&lt;BR /&gt;
     [tcpout-server://192.168.230.23:9992]&lt;BR /&gt;
     useACK = true&lt;BR /&gt;
App 4. Props on the Forwarder to define which route and which index file to use for particular hosts:&lt;BR /&gt;
    [host::d*cr01]&lt;BR /&gt;
   TRANSFORMS-netwcr = set-idx-netwerkswitches0000s, set-rt-p&lt;BR /&gt;
App 4. Transforms on the Forwarder:&lt;BR /&gt;
     [set-idx-netwerkswitches0000s]&lt;BR /&gt;
     REGEX = .&lt;BR /&gt;
     FORMAT = netwerk-switches_0000-s&lt;BR /&gt;
     DEST_KEY = _MetaData:Index&lt;BR /&gt;
     [set-rt-p]&lt;BR /&gt;
    REGEX = .&lt;BR /&gt;
    FORMAT = to-idxr-p&lt;BR /&gt;
    DEST_KEY = _TCP_ROUTING &lt;BR /&gt;
App 5 . indexes for the Cluster Peers to deploy using the Master configuration bundle&lt;BR /&gt;
   [netwerk-switches_0000-s]&lt;BR /&gt;
   homePath = $SPLUNK_DB/netwerk-switches_0000-s/db&lt;BR /&gt;
   coldPath = $SPLUNK_DB/netwerk-switches_0000-s/colddb&lt;BR /&gt;
   thawedPath = $SPLUNK_DB/netwerk-switches_0000-s/thaweddb&lt;BR /&gt;
   # Rotate Hot Buckets daily&lt;BR /&gt;
   maxHotSpanSecs = 86400&lt;BR /&gt;
   # Max size of Hot Bucket is 750 MB&lt;BR /&gt;
   maxDataSize = auto&lt;BR /&gt;
   # After 184 days (July + August, 4 months of 31 days), delete the buckets&lt;BR /&gt;
   # If no FrozenDir is given, /dev/null is used&lt;BR /&gt;
   frozenTimePeriodInSecs = 15897600&lt;BR /&gt;
   # Total size of Hot, Warm and Cold Buckets should never exceed 184 GB&lt;BR /&gt;
   # Based on maximum daily volume of 1 GB&lt;BR /&gt;
   maxTotalDataSizeMB = 184000&lt;BR /&gt;
   # Replication setting&lt;BR /&gt;
   repFactor = auto&lt;BR /&gt;
Then I deploy the TA-cisco-ios  onto the Cluster peers and onto the Search Head&lt;BR /&gt;
I deploy the TA-cisco-wsa, TA-cisco-esa, TA-cisco-asa, TA-cisco-ios onto the Search Head&lt;BR /&gt;
I deploy the SA-cisco-wsa, SA-cisco-esa, TA-cisco-asa onto the Search Head&lt;BR /&gt;
I deploy the dasboard apps Cisco Security Suite cisco-ios onto the Search Head.&lt;/P&gt;

&lt;P&gt;I modify the configuration, because I do not have to deploy indexer files onto the Forwarder or onto the Search Head ofcource.&lt;BR /&gt;
So finally your answer:&lt;BR /&gt;
I deploy the dashboard app onto the Search Head only.  &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Frank Maasdam&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:14:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211266#M10083</guid>
      <dc:creator>frmaasdam</dc:creator>
      <dc:date>2020-09-29T08:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: Installing Enterprise Security app in a distributed environment</title>
      <link>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211267#M10084</link>
      <description>&lt;P&gt;First of all you should install Enterprise Security on the Search Head and choose add-ons which you need, &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;then configure add-on pack in via Enterprise Security &lt;/LI&gt;
&lt;LI&gt;then download it and add to cluster master &lt;/LI&gt;
&lt;LI&gt;then push configuration to indexers&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Whole process is described in this article:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/ES/5.0.0/Install/InstallTechnologyAdd-ons"&gt;http://docs.splunk.com/Documentation/ES/5.0.0/Install/InstallTechnologyAdd-ons&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 15:25:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Installing-Enterprise-Security-app-in-a-distributed-environment/m-p/211267#M10084</guid>
      <dc:creator>skulk</dc:creator>
      <dc:date>2018-04-05T15:25:47Z</dc:date>
    </item>
  </channel>
</rss>

