<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why am I unable to get a Splunk forwarder and indexer to talk over SSL using a non-default CA? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218980#M43020</link>
    <description>&lt;P&gt;I answered my second question - the correct command is:&lt;BR /&gt;
    openssl rsa -in /opt/splunkforwarder/etc/certs/myServerCertificate.pem -text&lt;BR /&gt;
I am able to decrypt that key using the same password I entered in the outputs.conf on the forwarder.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Sep 2015 18:09:57 GMT</pubDate>
    <dc:creator>ryanleerally</dc:creator>
    <dc:date>2015-09-10T18:09:57Z</dc:date>
    <item>
      <title>Why am I unable to get a Splunk forwarder and indexer to talk over SSL using a non-default CA?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218979#M43019</link>
      <description>&lt;P&gt;Hey all, &lt;/P&gt;

&lt;P&gt;I'm having a really tough time getting my forwarders and indexer to talk over SSL using a non-default CA. I've searched through other answers, but haven't found any resolution. I've been following this guide:&lt;BR /&gt;
&lt;A href="https://wiki.splunk.com/Community:Splunk2Splunk_SSL_SelfSignedCert_NewRootCA"&gt;https://wiki.splunk.com/Community:Splunk2Splunk_SSL_SelfSignedCert_NewRootCA&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I've also read through &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.3/Security/ConfigureSplunkforwardingtousesignedcertificates"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.3/Security/ConfigureSplunkforwardingtousesignedcertificates&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;I generated the CA root cert, generated &amp;amp; signed my CA public cert (myCACertificate.pem), then generated, signed, and my server cert with the public, private, and CA certs (myServerCertificate.pem) with "splunkserver.internal.domain"&lt;BR /&gt;
I modified my inputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# cat /opt/splunk/etc/system/local/inputs.conf
[default]
host = splunkserver

[splunktcp-ssl:9997]
compressed = true
disabled = 0

[SSL]
password = {myServerPrivateKey.key password}
rootCA = $SPLUNK_HOME/etc/certs/myCACertificate.pem
serverCert = $SPLUNK_HOME/etc/certs/myServerCertificate.pem
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I restarted Splunk and see this in my splunkd.log, which supposedly means the server has accepted the certificate:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09-10-2015 17:12:30.560 +0000 INFO  loader - Server supporting SSL versions SSL3,TLS1.0,TLS1.1,TLS1.2
09-10-2015 17:12:30.879 +0000 INFO  TcpInputConfig - IPv4 port 9997 is reserved for splunk 2 splunk (SSL)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I copied myCACertificate.pem and myServerCertificate.pem using SCP to the forwarder &amp;amp; modified its outputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# cat /opt/splunkforwarder/etc/system/local/outputs.conf
[tcpout]
defaultGroup = splunkssl

[tcpout:splunkssl]
compressed = true
server = {IP_of_server}:9997
sslCertPath = /opt/splunkforwarder/etc/certs/myServerCertificate.pem
sslPassword = {myServerPrivateKey.key password}
sslRootCAPath = /opt/splunkforwarder/etc/certs/myCACertificate.pem
sslVerifyServerCert = true
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I restarted the Splunk forwarder and get this output:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Stopping splunkd...
Shutting down.  Please wait, as this may take a few minutes.

Stopping splunk helpers...

Done.

Splunk&amp;gt; Winning the War on Error

Checking prerequisites...
        Checking mgmt port [8089]: open
        Checking conf files for problems...
Can't read key file /opt/splunkforwarder/etc/auth/server.pem errno=587690100 error:23077074:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 cipherfinal error.
Couldn't initialize SSL Context for HTTPClient in ServerConfig
        Done
All preliminary checks passed.

Starting splunk server daemon (splunkd)...
Done
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I see this in splunkd.log:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09-10-2015 17:32:10.531 +0000 ERROR SSLCommon - Can't read key file /opt/splunkforwarder/etc/auth/server.pem errno=587690100 error:23077074:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 cipherfinal error.
09-10-2015 17:32:10.532 +0000 ERROR HTTPServer - SSL context could not be created - error in cert or password is wrong
09-10-2015 17:32:10.532 +0000 ERROR HTTPServer - SSL will not be enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I have a few questions:&lt;/P&gt;

&lt;P&gt;Why is the Splunk forwarder trying to use &lt;CODE&gt;/opt/splunkforwarder/etc/auth/server.pem&lt;/CODE&gt; when I specified &lt;CODE&gt;/opt/splunkforwarder/etc/certs/myServerCertificate.pem&lt;/CODE&gt;? I see that according to the guide, the expected logs from the forwarder use server.pem as well.&lt;/P&gt;

&lt;P&gt;Should I be able to run &lt;CODE&gt;openssl x509 -in /opt/splunkforwarder/etc/certs/myServerCertificate.pem -text -noout&lt;/CODE&gt; and get output without entering a password?&lt;BR /&gt;
and finally... what the heck am I doing wrong?!&lt;/P&gt;

&lt;P&gt;Any help is appreciated! Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 17:41:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218979#M43019</guid>
      <dc:creator>ryanleerally</dc:creator>
      <dc:date>2015-09-10T17:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I unable to get a Splunk forwarder and indexer to talk over SSL using a non-default CA?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218980#M43020</link>
      <description>&lt;P&gt;I answered my second question - the correct command is:&lt;BR /&gt;
    openssl rsa -in /opt/splunkforwarder/etc/certs/myServerCertificate.pem -text&lt;BR /&gt;
I am able to decrypt that key using the same password I entered in the outputs.conf on the forwarder.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 18:09:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218980#M43020</guid>
      <dc:creator>ryanleerally</dc:creator>
      <dc:date>2015-09-10T18:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I unable to get a Splunk forwarder and indexer to talk over SSL using a non-default CA?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218981#M43021</link>
      <description>&lt;P&gt;I figured this out. When I created my certificates, I used the same CN for the CA and server certs. I used a different name for my CA and that worked.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2015 15:15:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-am-I-unable-to-get-a-Splunk-forwarder-and-indexer-to-talk/m-p/218981#M43021</guid>
      <dc:creator>ryanleerally</dc:creator>
      <dc:date>2015-09-11T15:15:23Z</dc:date>
    </item>
  </channel>
</rss>

