Add custom policies
To add custom rules to your configuration, create a new policy package for those rules and then add them to Splunk Enterprise. Do not modify the existing Splunk policy package files.
To create and install a new policy package:
- . Temporarily set SELinux to "Permissive" mode:
setenforce 0
- Create policy package files using the
sepolgen
command. This creates three files: *.fc, *.if, *.te:package into .pp
- Install the policy package:
semodule –i *.pp
- Review the audit log to ensure there are no relevant denials:
type=AVC
- If there are any denials, convert them to allow rules for the Type Enforcement definition file (*.te), for example in grep denies "/vr/log/audit/audit.log:
grep "denied" /var/log/audit/audit.log | audit2allow
- Once there are no denial messages set SELinux back to "Enforced"
setenforce 1
- Restart Splunk Enterprise:
service splunk restart
Configure Splunk Enterprise for Common Criteria | Add ports and logs |
This documentation applies to the following versions of Splunk® Enterprise: 7.3.3, 7.3.4, 8.1.1, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4
Feedback submitted, thanks!