In a distributed environment, Splunk Enterprise indexers must be configured to ingest log records from its forwarders.
An XCCDF Rule
Description
<VulnDiscussion>Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that network segment. However, this does not achieve compliance with the DoD requirement for a centralized enclave log server. To comply with this requirement, create a central log server that aggregates multiple log servers, or use another method to ensure log analysis and management is centrally managed and available to enterprise forensics and analysis tools. This server is often called a log aggregator, SIEM, or events server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-251664r960873_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
On the forwarders, configure the outputs.conf with the information of the indexer that the data will be sent to for analysis.
On the indexer, configure the inputs.conf file with the information of the forwarders that are sending the data for analysis.