I am configuring a hostname validation TLS certificate with a self-signed certificate in splunk enterprise 9.0 and it seems to me that it cannot trust the CA
ERROR X509Verify [TelemetryMetricBuffer] - Server X509 certificate (CN=,DC=,DC=,DC=) failed validation; error=19, reason="self signed certificate in certificate chain" the configuration is the following:
[sslConfig]
# turns on TLS certificate requirements
sslVerifyServerCert = true
# turns on TLS certificate host name validation
sslVerifyServerName = true
serverCert = <path to your server certificate>
Do you know how I can tell splunk which CA I'm using so it can trust the certificate? or how can i configure it?
... View more