Install Splunk Enterprise securely
To install Splunk Enterprise securely, you must have an installation package that you have confirmed is authentic and has not been modified in any way since Splunk created it. Splunk provides a Message Digest 5 (MD5) secure hash for every package it generates. You can download this hash to quickly verify that the package you downloaded is authentic and has not been changed since its creation.
You can also compare the Secure Hash Algorithm-512 (SHA-512) hashes by opening a case with Splunk Support.
Prerequisites for verifying package integrity
You must have the following to verify the contents of packages you download:
md5sumprogram, which prints the hash of the file that you supply, and comes with most versions of Linux. On Windows, you can use the
certutiltool to verify MD5 hashes.
- Alternatively, the
sha512sumprogram prints SHA512 hashes for the file that you supply.
- The MD5 or SHA512 hashes, in text format, which Splunk provide
- Access to a shell prompt
Verify installation package integrity
After you download the Splunk Enterprise package, verify it by using a trusted version of the OpenSSL suite to compare the MD5 or SHA-512 hashes to the hash of the installation package. If the hash of the package you downloaded matches the hash that Splunk provides, then you have downloaded a valid, secure installation package and can proceed with installation.
Download Splunk Enterprise installation package and MD5 hash
Confirm that you download the MD5 hash that exactly matches the version of installation package that you downloaded. Downloading a different file results in the hashes not matching.
- Go to the Splunk.com download page.
- Click Splunk Enterprise.
- Click the tab for the operating system that you want to download Splunk software.
- Click the Download Now link for the OS version and installation package type that you want to install with.
- On the next page that loads, read the Splunk Software License Agreement.
- Click the I have read, understood, and hereby accept the Splunk Software License Agreement checkbox.
- Click Start your download now. The page refreshes and the download begins.
- On the next page that loads, in the Useful tools box, click MD5 to verify. A second file, the MD5 hash, begins to download.
- After both downloads finish, complete the "Verify hashes" procedure.
Download Splunk Enterprise installation package and request SHA512 hash from Splunk Support
- Complete Steps 1 through 7 of the "Download Splunk Enterprise installation package and MD5 hash" procedure.
- Open a case with Splunk Support to receive the SHA512 hash. When you open the case, provide a link to the version, operating system, and type of installation package you downloaded.
- After you receive a link to the hash, follow the link to download it.
- After the package and SHA512 hash downloads finish, complete the "Verify hashes" procedure.
After you download the package, verify it by running either the
- Open a shell prompt.
- Change to the directory where you downloaded the installation package and the MD5 hash.
- Print the contents of the hash file that you downloaded:
- Run the
sha512sumtool on the installation package that you downloaded:
- Compare the output from the MD5 or SHA512 hash file against the result from the
- If the hashes match exactly, then the package you downloaded is authentic and you can continue with the installation. If the hash does not match, try downloading the package again as it's incomplete or has been modified.
You can verify the authenticity of the downloaded RPM package using the Splunk GnuPG Public key as follows
- Download the GnuPG Public key file (yes, this link is over TLS).
- Install the GnuPG public key:
rpm --import <filename>
- Verify the package signature using:
rpm -K <filename>
Proceed with installation from your authenticated installation package
After you have successfully verified your installation package as authentic, you can proceed with installation.
- Installation instructions in the Installation Manual
How to secure and harden your Splunk software installation
Create secure administrator credentials
This documentation applies to the following versions of Splunk® Enterprise: 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.3.9, 6.3.10, 6.3.11, 6.3.12, 6.3.13, 6.3.14, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.10, 6.4.11, 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.5.10, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4