Splunk® Enterprise

Securing Splunk Enterprise

Download manual as PDF

This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Download topic as PDF

Configure Splunk forwarding to use the default certificate

The default root certificate that ships with Splunk software is the same root certificate in every download. That means that anyone who has downloaded Splunk software has server certificates that have been signed by the same root certificate and would be able to authenticate to your certificates. To ensure that no one can easily snoop on your traffic or wrongfully send data to your indexers, we recommend that you replace them with signed certificates.

Important: The default certificates are set to expire three years after they are generated and new certificates must be created and configured at that time using one of the methods described in this manual.

To configure your forwarders to use certificates signed by your own root CA or a third-party CA see Configure Splunk forwarding to use your own certificates.

In this topic we describe how to:

  • Configure the indexer to use the default certificates that ship with Splunk software
  • Configure the forwarder to use the default certificates that ship with Splunk software

Note: When configuring multiple forwarders, configure each forwarder to use the default certificate separately.

Set up the indexer to use the default server certificate

1. In $SPLUNK_HOME/etc/system/local/inputs.conf (or the appropriate directory of any app you are using to distribute your forwarding configuration), set up the following stanzas:

For this example, we are using port 9997 to receive data from forwarders.

[SSL]
requireClientCert=false
[splunktcp-ssl:9997]
disabled=0

Where serverCert is the path to the default server certificate.

The default certificate can be found at $SPLUNK_HOME/etc/auth/server.pem.

Note: When using the default certificate it is not necessary to set requireClientCert = true since we do not need to check the validity of the default server certificate.

2. Restart splunkd:

$SPLUNK_HOME/bin/splunk restart splunkd

Configure the forwarder

Set up your forwarder to use the same default certificates as your indexer and configure the forwarder to send data to the configured listening port.

In the following example, the indexer IP address is 10.1.12.112.

1. Define the following stanzas in $SPLUNK_HOME/etc/system/local/outputs.conf (or in the appropriate directory of any app you are using to distribute your forwarding configuration):

[tcpout]
server = 10.1.12.112:9997
sslVerifyServerCert = false
server.conf/[sslConfig]/sslRootCAPath
sslCertPath = $SPLUNK_HOME/etc/auth/server.pem
sslPassword = password

Where rootCA is the path to the CA public key and serverCert is the path to the default server certificate.

Make sure that the sslVerifyServerCert attribute in outputs.conf is the same value as the attribute in </code>outputs.conf</code>. Splunk Enterprise recommends setting this value to false (which is the default). 2. Restart splunkd:

# $SPLUNK_HOME/bin/splunk restart splunkd

Next steps

Next, you should check your connection to make sure your configuration works. See "Validate your configuration" for more information.

PREVIOUS
About securing data from forwarders
  NEXT
Configure Splunk forwarding to use your own certificates

This documentation applies to the following versions of Splunk® Enterprise: 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.10, 6.4.11


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters