Activity Feed
- Got Karma for Re: Can't get started.... 06-05-2020 12:47 AM
- Got Karma for Re: Can't get started.... 06-05-2020 12:47 AM
- Got Karma for Re: Multi-site cluster configuration help with 2 cluster peers?. 06-05-2020 12:47 AM
- Got Karma for Re: Multi-site cluster configuration help with 2 cluster peers?. 06-05-2020 12:47 AM
- Got Karma for Re: Multi-site cluster configuration help with 2 cluster peers?. 06-05-2020 12:47 AM
- Got Karma for Re: Multi-site cluster configuration help with 2 cluster peers?. 06-05-2020 12:47 AM
- Got Karma for Re: Universal Forwarder not able to read all logs. 06-05-2020 12:47 AM
- Got Karma for Re: Universal Forwarder not able to read all logs. 06-05-2020 12:47 AM
- Got Karma for Re: Universal Forwarder not able to read all logs. 06-05-2020 12:47 AM
- Got Karma for Re: Universal Forwarder not able to read all logs. 06-05-2020 12:47 AM
- Got Karma for Re: Universal Forwarder not able to read all logs. 06-05-2020 12:47 AM
- Got Karma for Re: Am I breaking any best practices doing a chmod to grant a Splunk user access to Linux log files?. 06-05-2020 12:47 AM
- Got Karma for Re: Is there a centralized way to deploy configuration files?. 06-05-2020 12:47 AM
- Posted Re: Can I have a forwarder and indexer on the same machine just for experiment? on Getting Data In. 02-26-2019 11:24 AM
- Posted Re: Is there a centralized way to deploy configuration files? on Deployment Architecture. 09-19-2016 08:47 AM
- Posted Re: How to configure a new index via Splunk Web in an indexer clustering environment? on Deployment Architecture. 01-27-2016 10:15 PM
- Posted Re: Installing Enterprise Security app in a distributed environment on Installation. 12-30-2015 11:43 PM
- Posted Re: I disabled a transforms.conf stanza in Splunk Web, but why is the regex field extraction still effective? on Splunk Search. 11-15-2015 09:36 AM
- Posted Re: Linux Auditd: What is the best way to make /var/log/audit/audit.log accessible to a non-root Splunk forwarder? on All Apps and Add-ons. 10-05-2015 07:48 AM
- Posted Re: Is it possible to get performance data collected in SCOM into Splunk using the Splunk Add-on for Microsoft System Center Operations Manager? on All Apps and Add-ons. 07-06-2015 12:14 PM
Topics I've Started
No posts to display.
02-26-2019
11:24 AM
You can install several splunk instances in different directories on the same server.
For example /opt/splunk1/ as indexer1 and /opt/splunk2/ as indexer2
Use different port numbers for webinterface, replication etc etc
You can now start each splunk instance separately.
I have used this to test multi indexer cluster environment on one server.
... View more
09-19-2016
08:47 AM
1 Karma
When you create an app named app1 and an app named app2 both with for example an props.conf they will after deployment to the FW resides in:
~/etc/apps/app1/local/props.conf and
~/etc/apps/app2/local/props.conf
The working props.conf of the FW will be a merged running file of all the props.conf files on the system including those in the app1 and app2 directory.
There is no need to place them in ~/etc/system/local
... View more
01-27-2016
10:15 PM
You can creatie an app containing the needed indexes.conf and place it in de directory ../etc/master-apps/ on the master node.
An apply-cluster-bundle should distribute the indexes to all peer nodes.
... View more
12-30-2015
11:43 PM
Well.
I am using Splunk 6.2 and Cisco Security Suite version 3.0.3 build 100784.
An Universal Forwarder for sending the network logging data to the Forwarder
A Forwarder to receive the data
A Master/License node for my cluster.
An Deployment node to deploy the configurations onto the UFW, FW, SH.
Two Indexers (Cluster Peers)
One Search Head.
My configuration files (All Apps) deployed by the Deployment server (except those for the cluster peers )
App 1. inputs for the Universal Forwarder to define which logs and their sourcetypes:
sourcetype = cisco:asa
sourcetype = cisco:esa
sourcetype = cisco:ios
sourcetype = cisco:wsa:squid
App 2. outputs for the Universal Forwarder to define the route to the forwarder:
[tcpout:to-fwdr-p]
server = 192.168.230.20:10300
[tcpout-server://192.168.230.20:10300]
useACK = true
App 3. inputs on the Forwarder to define the input from the Universal Forwarder:
[splunktcp://10300]
connection_host = ip
App 4. Outputs on the Forwarder to define the route to the Indexers
server = 192.168.230.21:9991, 192.168.230.23:9992
[tcpout-server://192.168.230.21:9991]
useACK = true
[tcpout-server://192.168.230.23:9992]
useACK = true
App 4. Props on the Forwarder to define which route and which index file to use for particular hosts:
[host::d*cr01]
TRANSFORMS-netwcr = set-idx-netwerkswitches0000s, set-rt-p
App 4. Transforms on the Forwarder:
[set-idx-netwerkswitches0000s]
REGEX = .
FORMAT = netwerk-switches_0000-s
DEST_KEY = _MetaData:Index
[set-rt-p]
REGEX = .
FORMAT = to-idxr-p
DEST_KEY = _TCP_ROUTING
App 5 . indexes for the Cluster Peers to deploy using the Master configuration bundle
[netwerk-switches_0000-s]
homePath = $SPLUNK_DB/netwerk-switches_0000-s/db
coldPath = $SPLUNK_DB/netwerk-switches_0000-s/colddb
thawedPath = $SPLUNK_DB/netwerk-switches_0000-s/thaweddb
# Rotate Hot Buckets daily
maxHotSpanSecs = 86400
# Max size of Hot Bucket is 750 MB
maxDataSize = auto
# After 184 days (July + August, 4 months of 31 days), delete the buckets
# If no FrozenDir is given, /dev/null is used
frozenTimePeriodInSecs = 15897600
# Total size of Hot, Warm and Cold Buckets should never exceed 184 GB
# Based on maximum daily volume of 1 GB
maxTotalDataSizeMB = 184000
# Replication setting
repFactor = auto
Then I deploy the TA-cisco-ios onto the Cluster peers and onto the Search Head
I deploy the TA-cisco-wsa, TA-cisco-esa, TA-cisco-asa, TA-cisco-ios onto the Search Head
I deploy the SA-cisco-wsa, SA-cisco-esa, TA-cisco-asa onto the Search Head
I deploy the dasboard apps Cisco Security Suite cisco-ios onto the Search Head.
I modify the configuration, because I do not have to deploy indexer files onto the Forwarder or onto the Search Head ofcource.
So finally your answer:
I deploy the dashboard app onto the Search Head only. 😉
Regards,
Frank Maasdam
... View more
11-15-2015
09:36 AM
You can check your eventually combined transforms.conf by executing the command.
splunk cmd btool transforms list.
Then you can check which transforms are active or not.
... View more
10-05-2015
07:48 AM
Or to add an another solution. You can add an acl on that particular file.
... View more
07-06-2015
12:14 PM
It was the answer on your first question.
... View more
07-01-2015
01:51 PM
You can ofcourse place your config files in an self created app with any name like configapp.
This is how I deploy my inputs, outputs, props, transforms etc.
... View more
07-01-2015
12:29 PM
I know. You can use the directives in the xml file to configure the pollinterval after how many seconds the scom_client.ps1 script pull the events out of SCOM into Splunk.
... View more
07-01-2015
11:13 AM
http://operatingquadrant.com/2009/08/22/webmon-a-scom-management-pack-for-basic-web-site-monitoring-configured-with-a-single-xml-file-part-ii/
... View more
07-01-2015
09:33 AM
In the SCOM add-on xml configuration file 300
... View more
07-01-2015
07:46 AM
If it is a new index don't forget to set the rights correctly in de settings security for the admin rule. There you can set the index as one of the standard indexers to be able to search in.
... View more
05-20-2015
10:46 PM
Yes you can. I have a Master Deployment Forwarder 2 indexers and a Search head instance. In total 6 instances rrunning on 1 server.
... View more
11-03-2014
01:04 PM
So permission rights?
Files root:adm 640 right?
splunk member of adm group
Start Splunk with su -l splunk -c etc in initfile
Tried 650 rights on dir and files?
... View more
11-03-2014
12:20 PM
Some ideas
If you are unable to read the files there must be some lines in the splunkd.log of the forwarder saying permission denied.
If not the files are read.
Are you sure of the inputs syntax?
Do you something in the output configuration?
Check the props and transforms
Are they indexed in a different index and you have not given the rights to view this index?
Are they in the index and you are searching with an incorrect date or time?
... View more
11-03-2014
11:15 AM
4 Karma
I had more or less the same issues.
Logfiles owned by root:adm
Splunk running under user splunk
User splunk member of adm group
Login and su - splunk make it possible to cat the logfiles
BUT
Splunkforwarder running under user splunk was not able to read and forward the logfiles
2 options:
1. Start the Splunkforwarder using su -l splunk -c
This is what I have done
2. Setfacl on the logfiles to make USER splunk able to execute and read the files
I have done this in an other situation
,
... View more
11-03-2014
10:44 AM
1 Karma
Two possibilities here:
1. Make user Splunk member of the GID of your logfiles. Group adm? But be sure (regarding a bug) that you start your Splunk instance using su -u splunk -c
2. Or do a setfacl on the requested log files so that user splunk has the rights to execute and read the files.
... View more
11-03-2014
07:53 AM
Please notice my remark on the GID bug.
... View more
10-30-2014
11:37 AM
You can find your SA in Splunk_CiscoSecuritySuite/appserver/addons
You have to copy the desired SA directory to $SPLUNK-HOME/etc/apps
This will enable the SA asa dashboard in the SecuritySuite dashboard
... View more
10-30-2014
10:54 AM
Standard files from your app:
SA-cisco-asa/default/eventtypes.conf:search = (sourcetype="cisco:asa" OR sourcetype="cisco:pix" OR sourcetype="cisco:fwsm")
SA-cisco-asa/default/props.conf:[cisco:asa]
Splunk_CiscoSecuritySuite/lookups/cisco_device_info.csv:cisco:asa,cisco:asa,Firewall,network,Cisco,ASA,Adaptive Security Appliance
Splunk_TA_cisco-asa/default/eventgen.conf:sourcetype=cisco:asa
Splunk_TA_cisco-asa/default/eventtypes.conf:search = (sourcetype="cisco:asa" OR sourcetype="cisco:pix") message_id="4000*"
Splunk_TA_cisco-asa/default/props.conf:sourcetype = cisco:asa
Splunk_TA_cisco-asa/default/props.conf:[cisco:asa]
Splunk_TA_cisco-asa/default/transforms.conf:FORMAT = sourcetype::cisco:asa
Splunk_TA_cisco-asa/lookups/cisco_asa_ids_lookup.csv:cisco:asa,network
Our inputfiles from our UFW:
WG-CINP010_il_netwerk_fwdsyslog/default/inputs.conf:sourcetype = cisco:asa
WG-CINP010_il_netwerk_fwdsyslog/default/inputs.conf:sourcetype = cisco:asa
... View more
10-30-2014
10:02 AM
Of course you can check within your dashboard the search that has been done and failed.
... View more
10-30-2014
10:01 AM
Another remark. Check your sourcetype! So far I know it has been changed from cisco-asa ? to cisco:asa
... View more
10-30-2014
09:17 AM
You have to install the Suite, your TA's and SA on the search head.
You also have to install your SA's (yust copy that part from your Suite app directory) as separate apps in $SPLUNK-HOME/etc/apps/
... View more