MDR Salt Splunk Whitelisting FedRAMP Notes.txt 865 B

123456789101112131415161718192021
  1. Notes from talking with Fred
  2. Salt State -> Push cron job + bash script to Minions -> Bash script writes to file -> Splunk UF reads file and indexes it. -> Splunk creates lookup file which compares to a baseline lookup file. Differneces between the two are displayed on a dashboard and can be "approved". the approve button runs a search that will merge the two lookups and updates the baseline.
  3. Prelinking needs to be turned off
  4. https://access.redhat.com/solutions/61691
  5. proc f
  6. Dashboard is broken need to fix it. Remove the blacklist variable and it will start working.
  7. app uses SHA256 hashes
  8. Splunk search containing whitelist
  9. |inputlookup ProcessLookup
  10. |inputlookup ProcessLookup | search process=*splunk*
  11. |inputlookup ProcessLookup | search process=*splunk* | dedup file_hash
  12. Don't look for salt as a process. It is started with the python process.