SPLK-CL-000110 - In a distributed environment, Splunk Enterprise indexers must be configured to ingest log records from its forwarders.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that network segment. However, this does not achieve compliance with the DoD requirement for a centralized enclave log server.

To comply with this requirement, create a central log server that aggregates multiple log servers, or use another method to ensure log analysis and management is centrally managed and available to enterprise forensics and analysis tools. This server is often called a log aggregator, SIEM, or events server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

On the forwarders, configure the outputs.conf with the information of the indexer that the data will be sent to for analysis.

On the indexer, configure the inputs.conf file with the information of the forwarders that are sending the data for analysis.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_8-x_for-Linux_V1R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000174, Rule-ID|SV-251664r879557_rule, STIG-ID|SPLK-CL-000110, Vuln-ID|V-251664

Plugin: Splunk

Control ID: 5bfacd72705dbdcc8a47f978e5226108fc5953a636d97498269dc22cf5eed456