Getting Data In

Validate third party ssl splunk2splunk communication

vasanthmss
Motivator

Hi splunkers

I've configured 3rd party ssl between indexer and h.f. indexer 9997 open for tcp, 9996 for ssl. I've configured output confs for 9996 and sent the data . I could not see any internal logs as like wiki(older version). There is no updated document version for Splunk 2 Splunk third party ssl validation. I'm using 6.2.1 build for indexer and h.f.

Any idea how to validate that the data sent from h.f is encrypted?

Thanks
V

V
1 Solution

jworthington_sp
Splunk Employee
Splunk Employee

I'm not clear on your exact configuration, but it sounds like you are doing some indexing on the heavy forwarder and want to know how to validate the forwarder to Splunk connection? If that is the case, this topic might help: http://docs.splunk.com/Documentation/Splunk/latest/Security/Validateyourconfiguration

View solution in original post

jworthington_sp
Splunk Employee
Splunk Employee

I'm not clear on your exact configuration, but it sounds like you are doing some indexing on the heavy forwarder and want to know how to validate the forwarder to Splunk connection? If that is the case, this topic might help: http://docs.splunk.com/Documentation/Splunk/latest/Security/Validateyourconfiguration

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...