Configure the TLS Certificate
If the computer on which you're running the Splunk Open Database Connectivity (ODBC) Driver is across a firewall from the Splunk Enterprise server, instruct the Splunk ODBC driver to verify a signed certificate upon connection with the server. To do this, install a valid certificate for the management port on your Splunk Enterprise server, and enable the Verify Server SSL Certificate option in the Splunk ODBC driver.
Be aware that if you instruct the driver to verify a signed certificate, you must configure a Transport Layer Security (TLS) certificate on the Splunk Enterprise server because the default self-signed certificate is not sufficient. Not configuring a certificate on the Splunk Enterprise server causes the connection to fail.
The Splunk ODBC Driver supports only TLS version 1.2 and higher. SSL is not longer supported.
To set up this functionality, perform the following steps:
- On the Splunk Enterprise server, configure one or more certificates.
- Point splunkd to your certificate files by editing
server.conf. The following is an example of an edited sslConfig stanza:
[sslConfig] enableSplunkdSSL = true sslKeysfile = server.pem sslKeysfilePassword = password caCertFile = cacert.pem caPath = $SPLUNK_HOME/etc/auth
Do not set
truein server.conf. The Splunk ODBC Driver does not use an SSL client certificate, so this setting causes the connection to fail.
For more information on
server.conf, see server.conf in in the Splunk Enterprise Admin Manual.
- On the computer on which you've installed the Splunk ODBC Driver, follow the instructions in Enter or change configuration information to open the Splunk ODBC Connection Options window.
- Check the box next to Verify Server SSL Certificate.
Configure the proxy server
Configure the Load Balancer
This documentation applies to the following versions of Splunk® ODBC Driver: 3.1.0