Configure Splunk forwarding to use the default certificate
The default root certificate that ships with Splunk software is the same root certificate in every download. Splunk software uses these certificates by default. You do not need to configure them unless they have been removed or corrupted.
Default certificates are not considered highly secure. Anyone who has downloaded Splunk Enterprise has server certificates signed by the same root certificate and are able to authenticate to your certificates. To ensure that no one can easily snoop on your traffic or wrongfully send data to your indexers, replace the default certificates with certificates that you sign.
The default certificates expire three years after their generation and you must then create and configure new certificates using one of the methods described in Appendix A of this manual.
To configure your forwarders to use certificates that you have signed with your own root certificate authority (CA) or through a third-party CA, see Configure Splunk forwarding to use your own certificates.
Procedure for configuring Splunk forwarders to use the default certificates that come with Splunk software
- Configure the indexer to use the default certificates that ship with Splunk software
- Configure the forwarder to use the default certificates that ship with Splunk software
Set up the indexer to use the default server certificate
- In the
$SPLUNK_HOME/etc/system/local/inputs.conf
configuration file (or the appropriate directory of any app you are using to distribute your forwarding configuration), set up the following stanzas:[splunktcp-ssl:9997] disabled = 0 [SSL] serverCert = Absolute path to the certificate. The default certificate is $SPLUNK_HOME/etc/auth/server.pem sslPassword = password requireClientCert=false (There is no need validate the default server certificate)
- (Not required on Windows) In the
$SPLUNK_HOME/etc/system/local/server.conf
file, add the following:[sslConfig] sslRootCAPath = /opt/splunk/etc/auth/cacert.pem
- Restart the splunkd process on the indexer: $SPLUNK_HOME/bin/splunk restart splunkd
Configure the forwarder
Set up your forwarder to use the same default certificates as your indexer and configure the forwarder to send data to the configured listening port.
- Define the following stanzas in the
$SPLUNK_HOME/etc/system/local/outputs.conf
configuration file (or in the appropriate directory of any app you are using to distribute your forwarding configuration):[tcpout:group1] server = 10.1.12.112:9997 clientCert = $SPLUNK_HOME/etc/auth/server.pem sslPassword = password sslVerifyServerCert = false
- In the
$SPLUNK_HOME/etc/system/local/server.conf
file, add the following:
Linux:[sslConfig] sslRootCAPath = /opt/splunkforwarder/etc/auth/cacert.pem
Windows:
[sslConfig] caCertFile = cacert.pem caPath = $SPLUNK_HOME\etc\auth
- Restart the forwarder:
# $SPLUNK_HOME/bin/splunk restart splunkd
Next steps
Check the connection between the forwarder and the indexer to confirm that the configuration works. See "Validate your configuration" for more information.
About securing data from forwarders | Configure Splunk forwarding to use your own SSL certificates |
This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.10, 8.1.11, 8.1.12, 8.1.13, 8.1.14, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 8.2.11, 8.2.12
Feedback submitted, thanks!