Splunk Enterprise

KVstore stopped working, stuck in starting, not connecting to other shcluster members, related to server.pem

Glasses2
Communicator

Hi,
I recently had an issue where my SHCluster was throwing Kvstore errors.
The Kvstore status was abnormal.
The resolution was checking the server.pem expiration date in /opt/splunk/etc/auth
use >>> openssl x509 -in /opt/splunk/etc/auth/server.pem -noout -text
After removing the server.pem and restarting, Kvstore was back up.

Does anyone have a way to monitor the expiration dates for all the server.pem(s) in the deployment?

Thanks

Labels (2)
0 Karma

livehybrid
Super Champion

Hi @Glasses2 

Im glad you managed to fix your mongo issue - Not the first time SSL expiry has caught people out!

There is an app "SSL Certificate Checker" on Splunkbase at https://splunkbase.splunk.com/app/3172 which looks to solve this. You configure it with the path of the certificates you wish to monitor on a Splunk host and it reports the expiry into Splunk for you to create an alert for. Setting up for /opt/splunk/etc/auth/ should capture most things unless you have other custom certs in use.

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...