Hi, I am working on installing CA-signed (ssl.com) cert to a splunk enterprise instance, and keep hitting these two errors: 03-18-2025 23:32:08.751 +0000 ERROR UiHttpListener [122666 WebuiStartup] - TLS certificate is missing or invalid, please check your configuration or certificate file. 03-18-2025 23:32:08.751 +0000 ERROR UiHttpListener [122666 WebuiStartup] - Loaded TLS configurations from conf file=web, TLS cert check failed web.conf: [settings] mgmtHostPort = 0.0.0.0:8089 enableSplunkWebSSL = true privKeyPath = /opt/splunk/etc/auth/mycerts/splunk.key serverCert = /opt/splunk/etc/auth/mycerts/splunk.crt crt file contains the server cert, as well as CA chain concatenated at the end of the file. Cert file is valid: [root@splunk mycerts]# openssl x509 -in splunk.crt -noout -enddate notAfter=Jun 16 19:25:41 2025 GMT openssl verify -CAfile splunk.ca-bundle splunk.crt splunk.crt: OK How exactly does splunk perform "TLS cert", and is there a debug method to figure out what exactly it does not like about the CA-signed cert I am trying to configure? Permissions and cert file ownership are setup correctly (ie, 600/644 and splunk:splunk) Thank you!
... View more