All Apps and Add-ons

Can the eStreamer app be configured to receive data from more than one SourceFire Defense Center?

rwcbp
Explorer

During a phased migration to a newer SourceFire platform, multiple Defense Center appliances will be operating in the enterprise. If the Splunk eStreamer app cannot receive data from multiple Defense Centers there will be missing events in the indexed data during the migration period.

The web-based app configuration page has an entry field for a single certification. Can multiple certs be used by adding a second cert file and password line in the estreamer.conf file?

Example:
pkcs12_file = /opt/splunk/etc/apps/eStreamer/certs/0.0.0.0.pkcs12
pkcs12_password = ##########

0 Karma
1 Solution

cgrady_sf
Path Finder

Currently the app only supports a single Defense Center (now FireSIGHT Management Center) per installation. If events need to be collected from multiple systems, one forwarder will need to be deployed for each.

  • Colin

View solution in original post

0 Karma

cgrady_sf
Path Finder

Currently the app only supports a single Defense Center (now FireSIGHT Management Center) per installation. If events need to be collected from multiple systems, one forwarder will need to be deployed for each.

  • Colin
0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Deprecation of Splunk Observability Kubernetes “Classic Navigator” UI starting ...

Access to Splunk Observability Kubernetes “Classic Navigator” UI will no longer be available starting January ...

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...