Skip to content

Commit 49677b7

Browse files
authored
Merge pull request #317 from splunk/release/802
Release/802
2 parents c47ef5a + b5a2749 commit 49677b7

File tree

7 files changed

+280
-11
lines changed

7 files changed

+280
-11
lines changed

Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ SPLUNK_ANSIBLE_BRANCH ?= develop
77
SPLUNK_COMPOSE ?= cluster_absolute_unit.yaml
88
# Set Splunk version/build parameters here to define downstream URLs and file names
99
SPLUNK_PRODUCT := splunk
10-
SPLUNK_VERSION := 8.0.1
11-
SPLUNK_BUILD := 6db836e2fb9e
10+
SPLUNK_VERSION := 8.0.2
11+
SPLUNK_BUILD := a7f645ddaf91
1212
ifeq ($(shell arch), s390x)
1313
SPLUNK_ARCH = s390x
1414
else

base/redhat-8/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
# the container catalog moved from registry.access.redhat.com to registry.redhat.io
1717
# So at some point before they deprecate the old registry we have to make sure that
1818
# we have access to the new registry and change where we pull the ubi image from.
19-
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.0-213
19+
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.1-328
2020
LABEL name="splunk" \
2121
maintainer="support@splunk.com" \
2222
vendor="splunk" \

base/redhat-8/install.sh

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@
1515

1616
set -e
1717

18+
# Per: https://github.com/rpm-software-management/microdnf/issues/50
19+
mkdir -p /run/user/$UID
1820
# reinstalling local en def for now, removed in minimal image https://bugzilla.redhat.com/show_bug.cgi?id=1665251
1921
microdnf -y --nodocs install glibc-langpack-en
2022

@@ -25,7 +27,8 @@ microdnf -y --nodocs install glibc-langpack-en
2527
#We get around the gen above by forcing the language install, and then point to it.
2628
export LANG=en_US.utf8
2729

28-
microdnf -y --nodocs install wget sudo shadow-utils procps tar
30+
rpm -e --nodeps tzdata
31+
microdnf -y --nodocs install wget sudo shadow-utils procps tar tzdata
2932
#install busybox direct from the multiarch since epel isn't availible yet for redhat8
3033
wget -O /bin/busybox https://busybox.net/downloads/binaries/1.28.1-defconfig-multiarch/busybox-`arch`
3134
chmod +x /bin/busybox

docs/ADVANCED.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Let's dive into the nitty-gritty on how to tweak the setup of your containerized
1818
* [Enable SmartStore](#enable-smartstore)
1919
* [Using deployment servers](#using-deployment-servers)
2020
* [Deploy distributed topology](#deploy-distributed-topology)
21+
* [Enable SSL internal communication](#enable-ssl-internal-communication)
2122
* [Build from source](#build-from-source)
2223
* [base-debian-9](#base-debian-9)
2324
* [splunk-debian-9](#splunk-debian-9)
@@ -248,6 +249,25 @@ While running a standalone Splunk instance may be fine for testing and developme
248249

249250
See the [instructions on standing up a distributed environment](advanced/DISTRIBUTED_TOPOLOGY.md) to understand how to get started.
250251

252+
## Enable SSL Internal Communication
253+
For users looking to secure the network traffic from one Splunk instance to another Splunk instance (ex: forwarders to indexers), you can enable forwarding and receiving to use SSL certificates.
254+
255+
If you wish to enable SSL on one tier of your Splunk topology, it's very likely all instances will need it. To achieve this, we recommend you generate your server and CA certificates and add them to the `default.yml` which gets shared across all Splunk docker containers. Use this example `default.yml` snippet for the configuration of Splunk TCP with SSL.
256+
```
257+
splunk:
258+
...
259+
s2s:
260+
ca: /mnt/certs/ca.pem
261+
cert: /mnt/certs/cert.pem
262+
enable: true
263+
password: abcd1234
264+
port: 9997
265+
ssl: true
266+
...
267+
```
268+
269+
For more instructions on how to bring your own certificates, please see: https://docs.splunk.com/Documentation/Splunk/latest/Security/ConfigureSplunkforwardingtousesignedcertificates
270+
251271
## Build from source
252272
While we don't support or recommend you building your own images from source, it is entirely possible. This can be useful if you want to incorporate very experimental features, test new features, and if you have your own registry for persistent images.
253273

docs/CHANGELOG.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22

33
## Navigation
44

5+
* [8.0.2](#802)
56
* [8.0.1](#801)
67
* [8.0.0](#800)
78
* [7.3.4](#734)
@@ -23,6 +24,26 @@
2324

2425
---
2526

27+
## 8.0.2
28+
29+
#### What's New?
30+
* New Splunk Enterprise release of 8.0.2
31+
32+
#### docker-splunk changes:
33+
* Bumping Splunk version. For details, see: https://docs.splunk.com/Documentation/Splunk/8.0.2/ReleaseNotes/Fixedissues
34+
* Bugfixes and increasing test coverage for new features
35+
36+
#### splunk-ansible changes:
37+
* * Revised Splunk forwarding/receiving plays to optionally support SSL (see documentation on [securing data from forwarders](https://docs.splunk.com/Documentation/Splunk/latest/Security/Aboutsecuringdatafromforwarders))
38+
* Initial support for forwarder management using [Splunk Monitoring Console](https://docs.splunk.com/Documentation/Splunk/latest/DMC/DMCoverview)
39+
* New environment variables exposed to control replication/search factor for clusters, key/value pairs written to `splunk-launch.conf`, and replacing default security key (pass4SymmKey)
40+
41+
**NOTE** Changes made to support new features may break backwards-compatibility with former versions of the `default.yml` schema. This was deemed necessary for maintainability and extensibility for these additional features requested by the community. While we do test and make an effort to support previous schemas, it is strongly advised to regenerate the `default.yml` if you plan on upgrading to this version.
42+
43+
**DEPRECATION WARNING** As mentioned in the changelog, the environment variables `SPLUNK_SHC_SECRET` and `SPLUNK_IDXC_SECRET` will now be replaced by `SPLUNK_SHC_PASS4SYMMKEY` and `SPLUNK_IDXC_PASS4SYMMKEY` respectively. Both are currently supported and will be mapped to the same setting now, but in the future we will likely remove both `SPLUNK_SHC_SECRET` and `SPLUNK_IDXC_SECRET`
44+
45+
---
46+
2647
## 8.0.1
2748

2849
#### What's New?

splunk/common-files/createdefaults.py

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@
2525
splunk_hec_token = os.environ.get("SPLUNK_HEC_TOKEN", None)
2626
splunk_password = os.environ.get("SPLUNK_PASSWORD", None)
2727
splunk_idxc_secret = os.environ.get("SPLUNK_IDXC_SECRET", None)
28+
splunk_idxc_pass4SymmKey = os.environ.get("SPLUNK_IDXC_PASS4SYMMKEY", None)
2829
splunk_shc_secret = os.environ.get("SPLUNK_SHC_SECRET", None)
30+
splunk_shc_pass4SymmKey = os.environ.get("SPLUNK_SHC_PASS4SYMMKEY", None)
2931

3032
def random_generator(size=24):
3133
# Use System Random for
@@ -41,10 +43,18 @@ def random_generator(size=24):
4143
os.environ["SPLUNK_HEC_TOKEN"] = str(tempuuid)
4244
if not splunk_password:
4345
os.environ["SPLUNK_PASSWORD"] = random_generator()
44-
if not splunk_idxc_secret:
45-
os.environ["SPLUNK_IDXC_SECRET"] = random_generator()
46-
if not splunk_shc_secret:
47-
os.environ["SPLUNK_SHC_SECRET"] = random_generator()
46+
if splunk_idxc_pass4SymmKey:
47+
os.environ["SPLUNK_IDXC_PASS4SYMMKEY"] = os.environ["SPLUNK_IDXC_SECRET"] = splunk_idxc_pass4SymmKey
48+
elif splunk_idxc_secret:
49+
os.environ["SPLUNK_IDXC_PASS4SYMMKEY"] = os.environ["SPLUNK_IDXC_SECRET"] = splunk_idxc_secret
50+
else:
51+
os.environ["SPLUNK_IDXC_PASS4SYMMKEY"] = os.environ["SPLUNK_IDXC_SECRET"] = random_generator()
52+
if splunk_shc_secret:
53+
os.environ["SPLUNK_SHC_PASS4SYMMKEY"] = os.environ["SPLUNK_SHC_SECRET"] = splunk_shc_pass4SymmKey
54+
elif splunk_shc_pass4SymmKey:
55+
os.environ["SPLUNK_SHC_PASS4SYMMKEY"] = os.environ["SPLUNK_SHC_SECRET"] = splunk_shc_secret
56+
else:
57+
os.environ["SPLUNK_SHC_PASS4SYMMKEY"] = os.environ["SPLUNK_SHC_SECRET"] = random_generator()
4858
sys.argv.append("--write-to-stdout")
4959
import environ
5060
environ.main()

0 commit comments

Comments
 (0)