Getting Data In

Splunk SSL Error with Python

ws
Path Finder

Hi,

I’m currently encountering the following error message in `splunkd.log` when I enable the custom TA Add-on.

I have a Python script that successfully tests the signed CSR, private key, and root CA. It can establish a connection and retrieve logs as expected. However, when using the application created, I am seeing the error message. I’ve double-checked the values, and everything seems to be the same.

In our testing environment, it works, but the only difference I noticed is that the root CA certificate is in .csr format. Should I convert it to .pem, as we did in the testing environment?


-0700 ERROR ExecProcessor - message from "/data/splunk/bin/python3.7 /data/splunk/etc/apps/TA_case/bin/case.py" HTTPSConnectionPool(host='<HiddenForSensitivityPurpose>', port=443): Max retries exceeded with url: <HiddenForSensitivityPurpose>caseType=Service+Case&fromData=2025-02-06+17%3A23&endDate=2025-02-06+21%3A23 (Caused by SSLError(SSLCertverificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1106)')))

 

Labels (2)
0 Karma

ws
Path Finder

Anyone happen to know the following message? When i trigger a customize application, i get the follow message

 

ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c1106)

0 Karma

ws
Path Finder

May i know where part should i refer to for the following error?

ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c1106)

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

From my understanding (and I admit I might be wrong), isn't a csr a certificate signing request i.e. a request to a CA to sign a certificate, not an actual certificate? Perhaps this might be why you are having difficulties?

0 Karma

ws
Path Finder

My apologies if my explanation is confusing. You are right, the csr has been signed, so right now it's a certificate which is in .pem format. 

But the rather, the root ca certificate is in .cer format. 

And for my testing environment, the root ca certificate is in .pem format. 

My next step is trying to convert it but unsure will it work.

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...