Splunk® Data Stream Processor

Install and administer the Data Stream Processor

DSP 1.2.1 is impacted by the CVE-2021-44228 and CVE-2021-45046 security vulnerabilities from Apache Log4j. To fix these vulnerabilities, you must upgrade to DSP 1.2.4. See Upgrade the Splunk Data Stream Processor to 1.2.4 for upgrade instructions.

On October 30, 2022, all 1.2.x versions of the Splunk Data Stream Processor will reach its end of support date. See the Splunk Software Support Policy for details.

Network Encryption Policy

All external network traffic to and from the Splunk Data Stream Processor is encrypted, including:

  • Data sent from Splunk Forwarders to the Splunk Forwarders Service.
  • Data sent from the Splunk Data Stream Processor APIs
  • Data sent from Splunk Data Stream Processor push or pull connectors.
  • Data sent to/from Data Stream Processor source and sink functions, unless specified by the function.

Internal Kubernetes network traffic is not encrypted.

Last modified on 18 November, 2019
Port configuration requirements   Additional installation considerations

This documentation applies to the following versions of Splunk® Data Stream Processor: 1.1.0, 1.2.0, 1.2.1-patch02, 1.2.1, 1.2.2-patch02, 1.2.4, 1.2.5, 1.3.0, 1.3.1, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters