UCF STIG Viewer Logo

In a distributed environment, Splunk Enterprise indexers must be configured to ingest log records from its forwarders.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251664 SPLK-CL-000110 SV-251664r808228_rule Medium
Description
Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that network segment. However, this does not achieve compliance with the DoD requirement for a centralized enclave log server. To comply with this requirement, create a central log server that aggregates multiple log servers, or use another method to ensure log analysis and management is centrally managed and available to enterprise forensics and analysis tools. This server is often called a log aggregator, SIEM, or events server.
STIG Date
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide 2022-06-07

Details

Check Text ( C-55102r808226_chk )
This check is applicable to the instance with the Indexer role or the Forwarder role, which may be a different instance in a distributed environment.

Verify the Splunk Enterprise Environment is configured to ingest log records from different hosts.

On the forwarders, check if the output.conf file is configured with the details of the indexer is ingesting the log data (e.g., Hostname, port# etc.).

On the indexer, check if the input.conf file is configured with the details of the forwarders that are sending the data.

If the Splunk Enterprise is not configured to perform analysis of log records from across multiple hosts, this is a finding.
Fix Text (F-55056r808227_fix)
On the forwarders, configure the outputs.conf with the information of the indexer that the data will be sent to for analysis.

On the indexer, configure the inputs.conf file with the information of the forwarders that are sending the data for analysis.