Deployment Architecture

Deployment of configuration files

I29851
Explorer

Hi

Last week one of our vulnerability scan found out that our universal forwarders were suspectable to TLS CRIME vulnerability. To fix this vulnerability we updated our server configuration file (toggled allowSslCompression from True to False). Now we want to update server configuration file on all the servers but we found that server configuration is system specific and we can’t just replace it on every server.

We are not using deployment server in our environment. Is there any other way wherein we can go and append server config file?

Thank you

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

This Answer addresses the vulnerabilty: https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-... . It's a bit old, however.

As for how to deploy config files, this is why the Deployment Server exists.  It allows a Splunk admin to make a few changes in one place and have the automatically propagate to deployment clients.  The Cluster Manager the SHC deployer serve the same role for clustered indexers and search heads, respectively.

You can also use a third-party tool such as SCCM, Puppet, or Ansible.

---
If this reply helps you, an upvote would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

This Answer addresses the vulnerabilty: https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-shows-vulnerable-to-CVE-2012-4929-in-my-... . It's a bit old, however.

As for how to deploy config files, this is why the Deployment Server exists.  It allows a Splunk admin to make a few changes in one place and have the automatically propagate to deployment clients.  The Cluster Manager the SHC deployer serve the same role for clustered indexers and search heads, respectively.

You can also use a third-party tool such as SCCM, Puppet, or Ansible.

---
If this reply helps you, an upvote would be appreciated.
0 Karma
Get Updates on the Splunk Community!

What is the use drop_dm_object_name() clause in a query with tstats.?

I am trying to find out what purpose drop_dm_object_name() serves.

Advisory ID: SVD-2022-0608

Hi,Security alert: Splunk Universal Forwarder.Is this a customer installable upgrade (to version 9), or do I ...

How to use Timechart Query

Hey guys ,I need last 30 days stats for the use-cases that did not fire up on the ES console. Below is the ...