<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing HTTP Event Collector in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243897#M27633</link>
    <description>&lt;P&gt;melcher, i'm a little unclear on the files here.&lt;/P&gt;

&lt;P&gt;I have a certificate, a chain (intermediate certs) and a private key.  The private key is password protected.&lt;/P&gt;

&lt;P&gt;How does this relate to the options caCertFile, serverCert and sslPassword?  I see no option to specify the path to my private key.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Jul 2018 06:55:17 GMT</pubDate>
    <dc:creator>robwhite</dc:creator>
    <dc:date>2018-07-16T06:55:17Z</dc:date>
    <item>
      <title>How do I secure the event collector port 8088 with an ssl certificate?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243885#M27621</link>
      <description>&lt;P&gt;I need to use the HTTP Even Collector for ingestion and it will be exposed to the web so I need to secure this communications. How do I secure the event collector port 8088 with an ssl certificate?&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 20:16:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243885#M27621</guid>
      <dc:creator>brent_weaver</dc:creator>
      <dc:date>2022-05-03T20:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243886#M27622</link>
      <description>&lt;P&gt;Hi Brent_weaver, &lt;/P&gt;

&lt;P&gt;Please refer to this topic: &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.0/Data/UsetheHTTPEventCollector"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.0/Data/UsetheHTTPEventCollector&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Step 9: To have HEC listen and communicate over HTTPS rather than HTTP, click the Enable SSL checkbox. &lt;/P&gt;

&lt;P&gt;Hope it helps. &lt;BR /&gt;
Thanks!&lt;BR /&gt;
Hunter Shen&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 13:59:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243886#M27622</guid>
      <dc:creator>hunters_splunk</dc:creator>
      <dc:date>2016-10-12T13:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243887#M27623</link>
      <description>&lt;P&gt;Hi @hunters,&lt;/P&gt;

&lt;P&gt;Can you share an example as to where to configure the ssl certificate as with documentation its not clear.&lt;/P&gt;

&lt;P&gt;BTW i tried to set the sslconfig under $SPLUNK_HOME/etc/apps/splunk_httpinput/local/server.conf but in vain :(. Also tried the sslconfig under $SPLUNK_HOME/etc/system/local/server.conf  but no luck :(.&lt;/P&gt;

&lt;P&gt;server.conf details&lt;/P&gt;

&lt;P&gt;[sslConfig]&lt;BR /&gt;
enableSplunkdSSL = true&lt;BR /&gt;
useClientSSLCompression = true&lt;BR /&gt;
sslKeysfile = myServerCert.pem&lt;BR /&gt;
caCertFile = myCacert.pem&lt;BR /&gt;
caPath = $SPLUNK_HOME/etc/auth/actualCerts&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:26:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243887#M27623</guid>
      <dc:creator>mshenoyp</dc:creator>
      <dc:date>2020-09-29T11:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243888#M27624</link>
      <description>&lt;P&gt;Bump for an answer. &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.1/Admin/Inputsconf#http:_.28HTTP_Event_Collector.29"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.1/Admin/Inputsconf#http:_.28HTTP_Event_Collector.29&lt;/A&gt; may be useful, but an article dedicated to the nuances of the SSL cert configuration for HEC would be much appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 11:36:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243888#M27624</guid>
      <dc:creator>kngklla</dc:creator>
      <dc:date>2017-01-18T11:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243889#M27625</link>
      <description>&lt;P&gt;The HTTP Event Collector uses the SSL Cert settings from the &lt;CODE&gt;[general]&lt;/CODE&gt; stanza of the &lt;CODE&gt;$SPLUNK_HOME/etc/system/local/server.conf&lt;/CODE&gt; file. See the docs : &lt;A href="http://dev.splunk.com/view/event-collector/SP-CAAAE6Q"&gt;HEC Docs&lt;/A&gt;&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;enableSSL &lt;/P&gt;

&lt;P&gt;Whether the HTTP Event&lt;BR /&gt;
Collector server protocol is HTTP or&lt;BR /&gt;
HTTPS. 1 indicates HTTPS; 0 indicates&lt;BR /&gt;
HTTP. The default value is 1. If you&lt;BR /&gt;
set enableSSL to 1, HTTP Event&lt;BR /&gt;
Collector uses the SSL settings&lt;BR /&gt;
specified in the [general] stanza of&lt;BR /&gt;
the server.conf file.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 11 Aug 2017 02:50:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243889#M27625</guid>
      <dc:creator>amiracle</dc:creator>
      <dc:date>2017-08-11T02:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243890#M27626</link>
      <description>&lt;P&gt;Was anyone here able to get the HEC working with SSL? &lt;BR /&gt;
The above documentation points to  "the [general] stanza of the $SPLUNK_HOME/etc/system/local/server.conf file". &lt;BR /&gt;
However, the general stanza does not include options for feeding the path to the server.crt or the private server.key. &lt;BR /&gt;
Getting the ssl to work for the web server was much easier and well documented. I just had to do &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[settings]
enableSplunkWebSSL = true
privKeyPath = $SPLUNK_HOME/etc/auth/mycerts/server.key
serverCert = $SPLUNK_HOME/etc/auth/mycerts/server.crt
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in web.conf and load the certificate and the key to the above location. &lt;/P&gt;

&lt;P&gt;I am using third party certs btw. Can someone point me to a way to feed the certificate and the private key to the HEC?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 22:19:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243890#M27626</guid>
      <dc:creator>chinmayad</dc:creator>
      <dc:date>2017-08-22T22:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243891#M27627</link>
      <description>&lt;P&gt;I ran into this issue a bit myself. What I found needed to happen was to configure these settings in $SPLUNK_HOME/etc/system/local/server.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[sslConfig]
caCertFile = &amp;lt;ABSOLUTE_PATH_TO_CA_FILE&amp;gt;
serverCert = &amp;lt;ABSOLUTE_PATH_TO_SERVER_CERT_FILE&amp;gt;
sslPassword = &amp;lt;PASSWORD&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The key that I had to take note of was that the "sslPassword" setting &lt;EM&gt;needed&lt;/EM&gt; to be present. Otherwise it inherited the default "sslPassword" setting and failed to initialize SSL. If your third party SSL cert didn't come with a password, you can create one using openssl like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;openssl rsa -in splunk_ssl.pem -out splunk_ssl.pem -des3
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Aug 2017 22:38:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243891#M27627</guid>
      <dc:creator>melcher</dc:creator>
      <dc:date>2017-08-22T22:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243892#M27628</link>
      <description>&lt;P&gt;Check my above answer to see if that helps you out.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 15:28:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243892#M27628</guid>
      <dc:creator>melcher</dc:creator>
      <dc:date>2017-08-23T15:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243893#M27629</link>
      <description>&lt;P&gt;This is the exact same process we followed - just remember to put your cert on &lt;EM&gt;each&lt;/EM&gt; of the servers for the tier you're getting data in from; i.e. Heavy Forwarders or Indexing tier based upon which option you chose and make sure the certs are in the exact same path.&lt;/P&gt;

&lt;P&gt;FYI we left our sslPassword option empty and once we restarted the splunk process it auto-magically populated the information with a password.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 13:35:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243893#M27629</guid>
      <dc:creator>cxj</dc:creator>
      <dc:date>2017-09-12T13:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243894#M27630</link>
      <description>&lt;P&gt;I followed the exact same procedure.&lt;/P&gt;

&lt;P&gt;I configured the SSL certificate in the server.conf of the forwarder using the [sslConfig] section, but the HTTP event collector is still presenting my clients with the Splunk generated certificate.&lt;/P&gt;

&lt;P&gt;I have tried checking the error logs from Splunk to see if something was wrong and indeed the first few attempts, I found that my certificate was incorrect. (The following post helped me to figure this out: &lt;A href="https://answers.splunk.com/answers/402988/after-upgrading-to-64-why-are-our-signed-certs-no.html"&gt;https://answers.splunk.com/answers/402988/after-upgrading-to-64-why-are-our-signed-certs-no.html&lt;/A&gt;)&lt;/P&gt;

&lt;P&gt;However I do not receive any errors anymore in my logs, but still the forwarder is presenting my clients with the old Splunk generated certificate. Can someone tell me what I am doing wrong?&lt;/P&gt;

&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 15:38:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243894#M27630</guid>
      <dc:creator>Meertman</dc:creator>
      <dc:date>2017-09-14T15:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243895#M27631</link>
      <description>&lt;P&gt;Are your customers going through a VIP or going directly to the HF or Indexer? Not too sure how you're setup, but we're using a VIP in front of our HF tier. Once we applied the changes to EACH HF &lt;EM&gt;and&lt;/EM&gt; the customer used the full FQDN of the VIP then they were able to get a valid cert.&lt;/P&gt;

&lt;P&gt;The Splunk docs state to use a .PEM file, but we used a .CRT and .KEY file and that worked like a champ. Note: we're on Splunk 6.3.6 so your version/config may differ so check the splunk docs.&lt;/P&gt;

&lt;P&gt;Below what our server.conf looks like &lt;EM&gt;before&lt;/EM&gt; we restarted splunkd:&lt;BR /&gt;
[sslConfig]&lt;BR /&gt;
caCertFile = cert_name.crt&lt;BR /&gt;
caPath = path_to_cert&lt;BR /&gt;
sslKeysfile = cert_name.key&lt;BR /&gt;
sslKeysfilePassword =&lt;/P&gt;

&lt;P&gt;Lastly - make sure you update your inputs.conf for splunk_http to leverage SSL - note that we have a clustered server so this is configured on our deployment server and then pushed to our HF tier via serverclass.conf:&lt;/P&gt;

&lt;P&gt;[http]&lt;BR /&gt;
dedicatedIoThreads = 2&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
enableSSL = 1&lt;BR /&gt;
index = default&lt;BR /&gt;
port = 8090&lt;BR /&gt;
host = deployment_server_name&lt;BR /&gt;
maxSockets = 0&lt;BR /&gt;
maxThreads = 0&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:45:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243895#M27631</guid>
      <dc:creator>cxj</dc:creator>
      <dc:date>2020-09-29T15:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243896#M27632</link>
      <description>&lt;P&gt;Thanks for the input cxj. We are not going through a VIP as of yet and I am currently testing it with one universal forwarder in our DMZ. &lt;/P&gt;

&lt;P&gt;I did use a PEM, that included the public key, the private key, all intermediate CA's public keys and the public key of the CA. (which resolved all certificate errors in the logs). &lt;/P&gt;

&lt;P&gt;I did not provide the caPath or caCertFile as the documentation states that you are not required to do so on a Windows platform. (The version we are currently using is 6.4.1)&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2017 07:47:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243896#M27632</guid>
      <dc:creator>Meertman</dc:creator>
      <dc:date>2017-09-18T07:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243897#M27633</link>
      <description>&lt;P&gt;melcher, i'm a little unclear on the files here.&lt;/P&gt;

&lt;P&gt;I have a certificate, a chain (intermediate certs) and a private key.  The private key is password protected.&lt;/P&gt;

&lt;P&gt;How does this relate to the options caCertFile, serverCert and sslPassword?  I see no option to specify the path to my private key.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 06:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243897#M27633</guid>
      <dc:creator>robwhite</dc:creator>
      <dc:date>2018-07-16T06:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243898#M27634</link>
      <description>&lt;P&gt;You don't include the private key. Splunk doesn't use it. The cert itself needs to have a password applied to it. And then the cert and intermediate cert chains are what are used in the "caCertFile" and "serverCert" settings.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 15:52:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243898#M27634</guid>
      <dc:creator>melcher</dc:creator>
      <dc:date>2018-07-16T15:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243899#M27635</link>
      <description>&lt;P&gt;This seems a little bizarre.  I'm not sure how Splunk could ever not use a private key - otherwise what stops me just downloading the google.com cert and using that for my HEC?&lt;/P&gt;

&lt;P&gt;I found this blog which does use the private key and works for me &lt;A href="https://support.uberagent.com/hc/en-us/articles/212656725-Enable-HTTPS-for-Splunk-HTTP-Event-Collector"&gt;https://support.uberagent.com/hc/en-us/articles/212656725-Enable-HTTPS-for-Splunk-HTTP-Event-Collector&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 03:36:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243899#M27635</guid>
      <dc:creator>robwhite</dc:creator>
      <dc:date>2018-07-17T03:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243900#M27636</link>
      <description>&lt;P&gt;I've just spent some time with the same challenge and found out most of the above might not be the best solution, simply does not work, or is deprecated.&lt;/P&gt;

&lt;P&gt;By default when you enable HEC and choose enable SSL Splunk uses the same self signed certs as for port 8089.&lt;/P&gt;

&lt;P&gt;To secure HEC you can change this configurationin server.conf. Of course it might not be the best idea to secure your HEC with the same certs as port 8089 management traffic.&lt;/P&gt;

&lt;P&gt;We solved it by generating a new certification chain (resulting in a new pem with server cert + key + CA cert) and key and edit the HEC stanza in inputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[http]
disabled = 0
index = main
enableSSL = 1
serverCert = &amp;lt;full path to your certificate chain pem file&amp;gt;
sslPassword = &amp;lt;password for server key used in chain&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Restart splunkd and now your HEC uses this cert.&lt;/P&gt;

&lt;P&gt;For reference see:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.2.0/Admin/Inputsconf#http:_.28HTTP_Event_Collector.29"&gt;http://docs.splunk.com/Documentation/Splunk/7.2.0/Admin/Inputsconf#http:_.28HTTP_Event_Collector.29&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;As said Splunk expects a chain of certs and key, see the following examples for how to format this for Splunk and how to generate them self signed:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Security/Howtoself-signcertificates"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Security/Howtoself-signcertificates&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.2.0/Security/HowtoprepareyoursignedcertificatesforSplunk"&gt;http://docs.splunk.com/Documentation/Splunk/7.2.0/Security/HowtoprepareyoursignedcertificatesforSplunk&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 11:31:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243900#M27636</guid>
      <dc:creator>ischoenmaker</dc:creator>
      <dc:date>2018-10-18T11:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243901#M27637</link>
      <description>&lt;P&gt;As of more recent versions of Splunk (version 7.x and newer I believe) this works.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 19:22:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/243901#M27637</guid>
      <dc:creator>bpaul_splunk</dc:creator>
      <dc:date>2019-01-22T19:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/571431#M75360</link>
      <description>&lt;P&gt;This answer was the most helpful for me. I am adding a few things I found helpful for anyone using Certbot/LetsEncrypt&lt;/P&gt;&lt;P&gt;1. Generate the pem key using the letsencrypt certs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;cd /etc/letsencrypt/live/your-server-hostname/
cat cert.pem privkey.pem chain.pem &amp;gt; splunk.pem
chmod 777 splunk.pem&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Use the following for inputs.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[http]
disabled = 0
index = your-hec-index-name
enableSSL = 1
serverCert = /etc/letsencrypt/live/your-server-hostname/splunk.pem
sslPassword = 
crossOriginSharingPolicy = *&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Troubleshoot the connection&lt;/P&gt;&lt;P&gt;This comes from &lt;A href="https://community.splunk.com/t5/Security/Cna-t-Connect-to-HTTP-Event-Collector-Endpoint-with-My/m-p/308377" target="_blank" rel="noopener"&gt;this forum post&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl -k https://your-heavy-forwarder.com:8088/services/collector/event -H "Authorization: Splunk splunk-hec-token" -d '{"event":"hello world"}' -v&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 00:06:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/571431#M75360</guid>
      <dc:creator>jackjack</dc:creator>
      <dc:date>2021-10-19T00:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/596288#M76754</link>
      <description>&lt;P&gt;Which inputs.conf are you talking about?&lt;/P&gt;&lt;P&gt;I have:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;[root@splunk splunk]# find /opt/splunk/etc/ -name inputs.conf -print&lt;BR /&gt;/opt/splunk/etc/modules/distributedDeployment/classes/deployable/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk_secure_gateway/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk-dashboard-studio/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/SplunkLightForwarder/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/sample_app/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/journald_input/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/introspection_generator_addon/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk_instrumentation/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk_httpinput/local/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk_httpinput/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/splunk_monitoring_console/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/apps/python_upgrade_readiness_app/default/inputs.conf&lt;BR /&gt;/opt/splunk/etc/system/local/inputs.conf&lt;BR /&gt;/opt/splunk/etc/system/default/inputs.conf&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 19:52:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/596288#M76754</guid>
      <dc:creator>dstromberg</dc:creator>
      <dc:date>2022-05-03T19:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Securing HTTP Event Collector</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/599642#M76899</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245084"&gt;@dstromberg&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See this &lt;A href="https://community.splunk.com/t5/All-Apps-and-Add-ons/How-come-my-AWS-Kinesis-Firehose-is-failing-to-connect-to-HEC/m-p/599637/highlight/true#M76898" target="_self"&gt;link&lt;/A&gt;&lt;/P&gt;&lt;P&gt;it is under this directory, if you don't see input.conf then I guess you can create it there.&lt;/P&gt;&lt;P&gt;&lt;FONT face="helvetica" color="#000000"&gt;cd /opt/splunk/etc/system/local/&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 May 2022 04:19:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-secure-the-event-collector-port-8088-with-an-ssl/m-p/599642#M76899</guid>
      <dc:creator>bullet</dc:creator>
      <dc:date>2022-05-28T04:19:17Z</dc:date>
    </item>
  </channel>
</rss>

