About using SSL tools on Windows and Linux
This manual describes how to configure Splunk to use default, self-signed, or Certificate Authority signed certificates. For those who may not have certificates, we also provide simple examples for generating the certificates and keys using the command line and a version of OpenSSL that is packaged with Splunk.
Using the OpenSSL command-line examples
This manual provides a few basic examples for creating certificates using Splunk's version of OpenSSL in the command line. In order to perform these tasks you must have root administrator permissions. If you are working on a remote or virtual machine, you may have to take an extra step to ensure that you are able to perform all tasks:
- When working on a Windows platform, you may need to open the command line as the administrator: In the Start Menu, right click the .exe application and select run as administrator.
- When working on a *nix platform, you might need to use sudo to log in as the root administrator.
For more information about the differences between Windows and *nix, see the Administration Guide.
About SSL tools
Splunk ships with a recent version of OpenSSL at
A variety of other SSL tools are available for purchase and download that you can use to create and set up certificates. If you do choose to use OpenSSL for certificate configuration, we strongly recommend that you use the version that ships with Splunk to avoid compatibility issues. To make sure that you are using the version provided with Splunk, set your environment to the version in
$SPLUNK_HOME\splunk\bin for Windows:
The following is an example of the library path for *nix:
The following is an example of the path for Windows:
set PATH = %PATH%;%SPLUNK_HOME%\bin
About securing Splunk Enterprise with SSL
Configure SSL versions
This documentation applies to the following versions of Splunk® Enterprise: 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18