Getting Data In

Splunk SSL Error with Python

ws
Path Finder

Hi,

I’m currently encountering the following error message in `splunkd.log` when I enable the custom TA Add-on.

I have a Python script that successfully tests the signed CSR, private key, and root CA. It can establish a connection and retrieve logs as expected. However, when using the application created, I am seeing the error message. I’ve double-checked the values, and everything seems to be the same.

In our testing environment, it works, but the only difference I noticed is that the root CA certificate is in .csr format. Should I convert it to .pem, as we did in the testing environment?


-0700 ERROR ExecProcessor - message from "/data/splunk/bin/python3.7 /data/splunk/etc/apps/TA_case/bin/case.py" HTTPSConnectionPool(host='<HiddenForSensitivityPurpose>', port=443): Max retries exceeded with url: <HiddenForSensitivityPurpose>caseType=Service+Case&fromData=2025-02-06+17%3A23&endDate=2025-02-06+21%3A23 (Caused by SSLError(SSLCertverificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1106)')))

 

Labels (2)
0 Karma

ws
Path Finder

Anyone happen to know the following message? When i trigger a customize application, i get the follow message

 

ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c1106)

0 Karma

ws
Path Finder

May i know where part should i refer to for the following error?

ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c1106)

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

From my understanding (and I admit I might be wrong), isn't a csr a certificate signing request i.e. a request to a CA to sign a certificate, not an actual certificate? Perhaps this might be why you are having difficulties?

0 Karma

ws
Path Finder

My apologies if my explanation is confusing. You are right, the csr has been signed, so right now it's a certificate which is in .pem format. 

But the rather, the root ca certificate is in .cer format. 

And for my testing environment, the root ca certificate is in .pem format. 

My next step is trying to convert it but unsure will it work.

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...