Skip to content

Latest commit

 

History

History
52 lines (47 loc) · 1.98 KB

splunk.md

File metadata and controls

52 lines (47 loc) · 1.98 KB

SSO w/ Keycloak

  • See also:
  • Issue: Keycloak returning 'invalid requester' error
    • Solution: Disable 'client signature required' field in the Splunk client configuration within Keycloak
  • Issue: Keycloak authentication works successfully and redirects to Splunk, but Splunk returns a 'SAML response does not contain group information'
    • Solution: In Keycloak GUI -> Client Scopes -> role_list -> Mappers -> role list -> Change 'role attribute name' from 'Role' to 'role'
  • Issue: Keycloak returning 'invalid redirect uri' error
    • Solution: In Splunk GUI -> Settings -> Authentication Methods -> SAML Settings -> SAML Configuration -> Redirect to URL after logout, ensure value is "443" instead of "8000" if Splunk is behind a loadbalancer that redirects from 443.

Universal Forwarder Setup

export SPLUNK_HOME="/opt/splunkforwarder"
mkdir $SPLUNK_HOME
cd $SPLUNK_HOME
  • Download and install
wget -O splunkforwarder-9.0.0-6818ac46f2ec-linux-2.6-x86_64.rpm "https://download.splunk.com/products/universalforwarder/releases/9.0.0/linux/splunkforwarder-9.0.0-6818ac46f2ec-linux-2.6-x86_64.rpm"
rpm -i ./splunkforwarder-9.0.0-6818ac46f2ec-linux-2.6-x86_64.rpm
  • Run initial setup (test:password)
/opt/splunkforwarder/bin/splunk start --accept-license
  • Stop daemon, then enable at boot
/opt/splunkforwarder/bin/splunk stop
/opt/splunkforwarder/bin/splunk enable boot-start
/opt/splunkforwarder/bin/splunk start
  • Add a forwarder
/opt/splunkforwarder/bin/splunk add forward-server <IP>:<PORT>
  • Begin monitoring a log file
/opt/splunkforwarder/bin/splunk add monitor /var/log/messages

Files for universal forwarder:

  • Target server: /opt/splunkforwarder/etc/system/local/outputs.conf
  • Files to monitor: /opt/splunkforwarder/etc/apps/search/local/inputs.conf