Splunk Enterprise

authentication mechanism between deployment server and deployment clients

naagaraj
Engager

Hi All,

I have done a deployment server setup with over 20 machines. The deployment setup is working fine.

The security team has come up with a question regarding the communication between the splunk deployment server and the forwarders.

They wanted to know whether there is any API key through which authentication happens when the forwarders contacts the deployment server.

Is there any other authentication mechanism which takes place in this communication.

Any information would be helpful.

 

Thanks

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

By default, there is no authentication between the deployment server and its clients.  Connections are accepted from forwarders based on the whitelist and blacklist settings. 

You can add security by using certificates.  See https://docs.splunk.com/Documentation/Splunk/8.0.4/Security/Securingyourdeploymentserverandclients

---
If this reply helps you, Karma would be appreciated.

naagaraj
Engager

Hi Richgalloway,

 

Thanks for your reply. 

Do u also know if the certificates can also be pushed from deployment server to the clients similar to configurations.

Thanks

0 Karma

JBsplunkIT
Engager

Yes you can push out certificates just remember the password will need to be pushed along with it and it will be hashed by each machine it gets installed on

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...