<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: message &amp;quot;did not match any allowed names&amp;quot; is output to splunkd.log. in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751788#M22914</link>
    <description>&lt;P&gt;You might want to verify this with the support but it might be an issue of the IP address type of SAN. It's relatively rarely used and I suppose Splunk might be doing ony DNS-based SANs. If it is so, please post feedback to the docs website so that it's described more precisely.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Aug 2025 08:26:57 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2025-08-18T08:26:57Z</dc:date>
    <item>
      <title>message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751787#M22913</link>
      <description>&lt;P&gt;Splunk 9.4.2&lt;/P&gt;&lt;P&gt;I'm investigating communication between the LicenseMaster and Indexer (LMTracker).&lt;BR /&gt;Please tell me about SAN authentication.&lt;/P&gt;&lt;P&gt;hostname: Connection is successful.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;[sslConfig]&lt;BR /&gt;sslAltNameToCheck = license-1&lt;/P&gt;&lt;P&gt;IP: Connection fails.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;[sslConfig]&lt;BR /&gt;sslAltNameToCheck = xx.xx.xx.10&lt;/P&gt;&lt;P&gt;*The destination license-1 has already been configured with indexer-1 information.&lt;/P&gt;&lt;P&gt;If the connection fails, the splunkd.log displays the message "did not match any allowed names."&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;08-18-2025 07:01:17.784 +0000 ERROR X509 [88364 LMTrackerExecutorWorker-0] - X509 certificate (CN=license-1,OU=XXX,O=XXX,L=XXX,ST=XXX,C=XX) alternate name (license-1,localhost) did not match any allowed names (,xx.xx.xx.10)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The certificate's "Subject Alternative Name" is as follows:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;$ sudo openssl x509 -in /opt/splunk/etc/auth/mycerts/license-1.pem -noout -text | grep -A1 "Subject Alternative Name"&lt;BR /&gt;X509v3 Subject Alternative Name:&lt;BR /&gt;DNS:license-1, DNS:localhost, IP Address:xx.xx.xx.10&lt;/P&gt;&lt;P&gt;Splunk is using the "IP Address" in the SAN. Why isn't "Address:xx.xx.xx.10" being recognized?&lt;BR /&gt;Is it being recognized, but just not being output as a log?&lt;BR /&gt;Please let me know if there is anything I should review.&lt;/P&gt;&lt;P&gt;I use Google Translate to translate Japanese into English.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 08:11:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751787#M22913</guid>
      <dc:creator>OGS</dc:creator>
      <dc:date>2025-08-18T08:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751788#M22914</link>
      <description>&lt;P&gt;You might want to verify this with the support but it might be an issue of the IP address type of SAN. It's relatively rarely used and I suppose Splunk might be doing ony DNS-based SANs. If it is so, please post feedback to the docs website so that it's described more precisely.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 08:26:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751788#M22914</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-18T08:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751796#M22915</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262875"&gt;@OGS&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the docs and guides (&lt;A href="https://lantern.splunk.com/Splunk_Platform/Product_Tips/Administration/Securing_the_Splunk_platform_with_TLS" target="_blank"&gt;https://lantern.splunk.com/Splunk_Platform/Product_Tips/Administration/Securing_the_Splunk_platform_with_TLS&lt;/A&gt;) it should be possible to use an IP address in a SAN within your cert, however as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; it might not be something that can be verified against. It might be that only a DNS name can be used for the&amp;nbsp;&lt;SPAN&gt;sslAltNameToCheck.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you are using&amp;nbsp;sslAltNameToCheck or&amp;nbsp;sslCommonNameToCheck then do you need to validate against the IP address or are you able to use one of the other SAN from your cert as the&amp;nbsp;sslAltNameToCheck (or the CN to match&amp;nbsp;sslCommonNameToCheck)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 11:21:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751796#M22915</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-18T11:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751797#M22916</link>
      <description>&lt;P&gt;Interestingly the &lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.2/Admin/Serverconf#:~:text=The%20SAN%20can%20be%20a%0A%20%20short%20host%20name%20or%20a%20fully%20qualified%20domain%20name." target="_self"&gt;docs&lt;/A&gt; do actually state&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;The SAN can be a short host name or a fully qualified domain name.&lt;/PRE&gt;&lt;P&gt;so maybe it does have to be a DNS name?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 11:27:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751797#M22916</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-18T11:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751798#M22917</link>
      <description>&lt;P&gt;Yes. You&amp;nbsp;&lt;EM&gt;can&lt;/EM&gt;&amp;nbsp;issue a certificate with an&amp;nbsp;&lt;EM&gt;IP&lt;/EM&gt; property in the SAN extension. And (most?) browsers will accept it while verifying the connection to HTTP server.&lt;/P&gt;&lt;P&gt;But the question is whether Splunk itself will use it or not.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 11:30:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751798#M22917</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-18T11:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751829#M22918</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&lt;BR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;I'll share some further findings.&lt;/P&gt;&lt;P&gt;When used in conjunction with sslCommonNameToCheck, the "did not match any allowed names" message is sometimes not output.&lt;/P&gt;&lt;P&gt;No error.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;sslCommonNameToCheck = license-1 #present in CN and SAN&lt;BR /&gt;sslAltNameToCheck = xx.xx.xx.10 #IP present in SAN&lt;/P&gt;&lt;P&gt;This pattern also produces no error.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;sslCommonNameToCheck = license-1 #present in CN and SAN&lt;BR /&gt;sslAltNameToCheck = xx.xx.xx.100 #IP not present in SAN&lt;/P&gt;&lt;P&gt;I may have misinterpreted this due to an insufficient translation.&lt;BR /&gt;I had interpreted the sslAltNameToCheck setting as immediately terminating communication if there was a mismatch.&lt;/P&gt;&lt;P&gt;Is using ssl[Common/Alt]NameToCheck in conjunction with this setting correct?&lt;BR /&gt;As you all indicated, Splunk ignores IP addresses, but in the above pattern, did it switch to querying by CN?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2025 04:56:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751829#M22918</guid>
      <dc:creator>OGS</dc:creator>
      <dc:date>2025-08-19T04:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: message "did not match any allowed names" is output to splunkd.log.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751830#M22919</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262875"&gt;@OGS&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes. When sslAltNameToCheck fails but sslCommonNameToCheck succeeds, Splunk falls back to CN validation and allows the connection.&lt;/P&gt;&lt;P&gt;Best is to use DNS names in your SAN and match them with sslAltNameToCheck&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2025 05:10:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/message-quot-did-not-match-any-allowed-names-quot-is-output-to/m-p/751830#M22919</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-08-19T05:10:26Z</dc:date>
    </item>
  </channel>
</rss>

