Special Notes
This topic contains additional information for using the Splunk App for PCI Compliance.
Memory Usage
Some real-time searches have been discovered to trigger large amounts of memory consumption on Splunk versions 4.2.5 and 4.3. Splunk version 4.3.2 or higher is recommended.
CSV file format issues with Microsoft Excel on OS X
If you use Mac Excel to create and save a CSV file, the file will not upload to the Splunk App for PCI Compliance assets table, identity table, or other list or lookup.
The Mac version of Excel does not save the file with the proper CSV line endings, which must use UNIX line endings.
Workaround: Open file in vi (or other text editor) and run the command:
%s/^M/\r/g
Use ctrl-v ctrl-m
to input the ^M (line endings).
Or you can use the popular dos2unix
utility to correct line endings in a file produced on Windows or OS/X.
Upgrades: Re-enable the app
If for any reason, you begin an upgrade and then decide not to complete it, and want to continue to use the existing version of the Splunk App for PCI Compliance, the app must be re-enabled before it can be used.
All of the following apps need to be re-enabled using the Splunk Manager to fully re-enable the Splunk App for PCI Compliance:
- SA-*
- DA-PCI-*
- SplunkPCIComplianceSuite
To do this:
- Go to Manager > Apps.
- Click Enable next to each of these apps.
- Restart Splunk.
Note: Because the SA-* and DA-PCI* apps do not contain UI elements, no Enable button shows up on the Splunk Web Home page.
SA-AuditAndDataProtection is among the apps disabled/enabled through the steps of the upgrade process. If SA-AuditAndDataProtection is in the disabled state, Splunk Web is accessed via HTTP; if it is enabled, Splunk Web is accessed via HTTPS.
After re-enabling SA-AuditAndDataProtection (and the other apps) and restarting Splunk, navigate to Splunk Web via HTTPS.
Splunk Add-on for Check Point OPSEC LEA
TA-checkpoint
, the technology add-on for Check Point packaged with the Splunk App for PCI Compliance, is not compatible with the new Splunk Add-on for Check Point OPSEC LEA.
If you are using TA-checkpoint
(the existing technology add-on), remove it and replace it with the new add-on (Splunk Add-on for Check Point OPSEC LEA (Solaris or Linux)'). Plan accordingly and migrate to the new add-on as part of your upgrade strategy.
Note: The Splunk_TA_opsec
add-on does not extract a command
field. To extract this field, augment the `network_change`
macro using a local override. To do this, add this stanza to the $SPLUNK_HOME/etc/apps/SA-NetworkProtection/local/macros.conf
file:
## SA-NetworkProtection/local/macros.conf [network_change] definition = tag=network tag=modify | eval command=if(sourcetype=="opsec_audit",Operation." ".ObjectName,command) | fillnull value=unknown dvc,action,user,command
Change Log | How to get support and find more information about Splunk |
This documentation applies to the following versions of Splunk® App for PCI Compliance: 2.1.1
Feedback submitted, thanks!