<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP  Data Input  and SSL in Security</title>
    <link>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483077#M11122</link>
    <description>&lt;P&gt;Hi there.&lt;/P&gt;

&lt;P&gt;I trying to configure Splunk to receiving data from TCP port 514.&lt;/P&gt;

&lt;P&gt;I using default Splunk certificates witch are generated in /opt/splunk/etc/auth &lt;/P&gt;

&lt;P&gt;I configured inputs.conf :&lt;/P&gt;

&lt;P&gt;[tcp-ssl:514]&lt;BR /&gt;
sourcetype = syslog&lt;/P&gt;

&lt;P&gt;[SSL]&lt;/P&gt;

&lt;P&gt;rootCA = /opt/splunk/etc/auth/cacert.pem&lt;BR /&gt;
serverCert = /opt/splunk/etc/auth/server.pem&lt;/P&gt;

&lt;P&gt;On my network device I configured to send syslog to my Splunk server address via Tcp port 514 and import cacert.pem&lt;/P&gt;

&lt;P&gt;After that i can't explore logs via this device but logos are hashed. &lt;/P&gt;

&lt;P&gt;What I am doing wrong?&lt;/P&gt;</description>
    <pubDate>Wed, 26 Feb 2020 10:59:10 GMT</pubDate>
    <dc:creator>tskubisz</dc:creator>
    <dc:date>2020-02-26T10:59:10Z</dc:date>
    <item>
      <title>TCP  Data Input  and SSL</title>
      <link>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483077#M11122</link>
      <description>&lt;P&gt;Hi there.&lt;/P&gt;

&lt;P&gt;I trying to configure Splunk to receiving data from TCP port 514.&lt;/P&gt;

&lt;P&gt;I using default Splunk certificates witch are generated in /opt/splunk/etc/auth &lt;/P&gt;

&lt;P&gt;I configured inputs.conf :&lt;/P&gt;

&lt;P&gt;[tcp-ssl:514]&lt;BR /&gt;
sourcetype = syslog&lt;/P&gt;

&lt;P&gt;[SSL]&lt;/P&gt;

&lt;P&gt;rootCA = /opt/splunk/etc/auth/cacert.pem&lt;BR /&gt;
serverCert = /opt/splunk/etc/auth/server.pem&lt;/P&gt;

&lt;P&gt;On my network device I configured to send syslog to my Splunk server address via Tcp port 514 and import cacert.pem&lt;/P&gt;

&lt;P&gt;After that i can't explore logs via this device but logos are hashed. &lt;/P&gt;

&lt;P&gt;What I am doing wrong?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 10:59:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483077#M11122</guid>
      <dc:creator>tskubisz</dc:creator>
      <dc:date>2020-02-26T10:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: TCP  Data Input  and SSL</title>
      <link>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483078#M11123</link>
      <description>&lt;P&gt;You would need the certificate on the syslog server&lt;BR /&gt;
I would update the app structure to the below so you can push the config to multiple endpoints via the deployment server &lt;/P&gt;

&lt;P&gt;&lt;EM&gt;base_app_name&lt;/EM&gt; EG: org_environment_type_base_app&lt;BR /&gt;
-- &lt;EM&gt;auth&lt;/EM&gt;&lt;BR /&gt;
---- serverCert.pem&lt;BR /&gt;
---- rootCACert.pem&lt;BR /&gt;
-- defaults OR local&lt;BR /&gt;
---- inputs.conf &lt;BR /&gt;
---- server.conf &lt;BR /&gt;
---- outputs.conf&lt;/P&gt;

&lt;P&gt;Your inputs.conf should contain&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[SSL]
serverCert = SPLUNK_HOME/etc/apps/*base_app_name*/auth/*file_name*.pem
sslPassword = #encryptedPassword
sslVersion = # version ### optional
requiredClientCert = # boolean
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;your server.conf should contain&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[sslConfig]
serverCert = SPLUNK_HOME/etc/apps/*base_app_name*/auth/*file_name*.pem 
sslRootCAPath= SPLUNK_HOME/etc/apps/*base_app_name*/auth/*file_name*.pem ### note rootCA is depreciated 
sslPassword = #password

[deployment]
pass4SymmKey = #password
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You also need an outputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[tcpout]
sslPassword = #password
clientCert = SPLUNK_HOME/etc/apps/*base_app_name*/auth/*file_name*.pem 
sslVersion = # version ### optional
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:25:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483078#M11123</guid>
      <dc:creator>anmolpatel</dc:creator>
      <dc:date>2020-09-30T04:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: TCP  Data Input  and SSL</title>
      <link>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483079#M11124</link>
      <description>&lt;P&gt;Thank you for help.&lt;BR /&gt;
I not sure did I correct understand this steps.&lt;BR /&gt;
Is that mean that I need to generate new certificate for client and upload this on Device from syslog is sending? (Synology NAS in my case) &lt;BR /&gt;
Also can't find what is default password. I don't created any password for SSL.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 13:39:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483079#M11124</guid>
      <dc:creator>tskubisz</dc:creator>
      <dc:date>2020-03-05T13:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: TCP  Data Input  and SSL</title>
      <link>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483080#M11125</link>
      <description>&lt;P&gt;@tskubisz  This will give you a walkthrough on how to generate it all for Splunk&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/Howtoself-signcertificates"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/Howtoself-signcertificates&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Yes, the certificate needs to be on the Device sending the syslog, go through this document for a thorough walkthrough&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/ConfigureSplunkforwardingtousesignedcertificates"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/ConfigureSplunkforwardingtousesignedcertificates&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Validation step:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/Validateyourconfiguration"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Security/Validateyourconfiguration&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 20:33:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/TCP-Data-Input-and-SSL/m-p/483080#M11125</guid>
      <dc:creator>anmolpatel</dc:creator>
      <dc:date>2020-03-05T20:33:58Z</dc:date>
    </item>
  </channel>
</rss>

