Deployment Architecture

DB Connect encryption

RicoSuave
Builder

Does the splunk DB connect app encrypt communication between splunk and the Database(s) it's connected to?

Tags (1)
1 Solution

ziegfried
Influencer

Unfortunately there is no definitive answer for this question. DB Connect uses JDBC drivers to connect to databases. Some of those JDBC drivers do support encryption, some don't. Some of them encrypt the connection by default, others don't.

Here's a quick list from the top of my head:

  • Microsoft SQL Server: SSL encryption is requested by default by the JDBC driver - so it depends on the server settings whether the connection is actually encrypted. It can be enforced to encrypt the connection, though.
  • Oracle: The JDBC driver supports multiple connection encryption levels (REJECTED, ACCEPTED, REQUESTED, REQUIRED). Encrypted connection are accepted by default (if enabled on the database server side)
  • MySQL: No encryption by default - has to be enabled manually (both on the server and on the Splunk side)
  • PostgreSQL: No encryption by default - has to be enabled manually (both on the server and on the Splunk side)

To summarize: In most cases encryption can be enabled but mostly requires some configuration on both sides (server and client).

If you have questions on how to enable encryption on the Splunk side for specific database types, make sure to ask them here on Answers.

Here's an answer that deals with PostgreSQL and SSL: http://splunk-base.splunk.com/answers/68899/dbx-connection-to-postgressql-error-ssl-off

View solution in original post

ziegfried
Influencer

Unfortunately there is no definitive answer for this question. DB Connect uses JDBC drivers to connect to databases. Some of those JDBC drivers do support encryption, some don't. Some of them encrypt the connection by default, others don't.

Here's a quick list from the top of my head:

  • Microsoft SQL Server: SSL encryption is requested by default by the JDBC driver - so it depends on the server settings whether the connection is actually encrypted. It can be enforced to encrypt the connection, though.
  • Oracle: The JDBC driver supports multiple connection encryption levels (REJECTED, ACCEPTED, REQUESTED, REQUIRED). Encrypted connection are accepted by default (if enabled on the database server side)
  • MySQL: No encryption by default - has to be enabled manually (both on the server and on the Splunk side)
  • PostgreSQL: No encryption by default - has to be enabled manually (both on the server and on the Splunk side)

To summarize: In most cases encryption can be enabled but mostly requires some configuration on both sides (server and client).

If you have questions on how to enable encryption on the Splunk side for specific database types, make sure to ask them here on Answers.

Here's an answer that deals with PostgreSQL and SSL: http://splunk-base.splunk.com/answers/68899/dbx-connection-to-postgressql-error-ssl-off

splunkIT
Splunk Employee
Splunk Employee

The connection is via JDBC; so I would assume it depends on the channel between the JDBC driver and the database itself.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...