Activity Feed
- Got Karma for Re: How to configure certificate on port 8089?. 09-01-2022 10:57 PM
- Got Karma for Re: How to configure certificate on port 8089?. 01-04-2022 10:38 AM
- Karma Re: Does Splunk support 3rd party certificates without passwords? for responsys_cm. 06-05-2020 12:49 AM
- Karma Re: Removed users from LDAP authentication but didn't remove them from Splunk users for brreeves_splunk. 06-05-2020 12:49 AM
- Karma Re: Can I set up SSL certificates without distributing the private key to clients? for FrankVl. 06-05-2020 12:49 AM
- Karma Re: Renewing server.pem certificate for harsmarvania57. 06-05-2020 12:49 AM
- Got Karma for Re: Why are there different names for inputs.conf and outputs.conf?. 06-05-2020 12:49 AM
- Got Karma for Re: Why are there different names for inputs.conf and outputs.conf?. 06-05-2020 12:49 AM
- Got Karma for Re: Why are there different names for inputs.conf and outputs.conf?. 06-05-2020 12:49 AM
- Karma Re: How do I forward log files to Hunk? for ChrisG. 06-05-2020 12:48 AM
- Karma Re: How to configure single sign-on in Splunk Enterprise? for acharlieh. 06-05-2020 12:48 AM
- Karma Re: Splunk 6.3 & SSO, SAML and Ping Federate for davidpaper. 06-05-2020 12:48 AM
- Karma Re: How to install an ssl key from a trusted certificate authority? for dwaddle. 06-05-2020 12:48 AM
- Karma Re: How do I forward log files to Hunk? for kschon_splunk. 06-05-2020 12:48 AM
- Karma Re: How to configure certificate on port 8089? for frobinson_splun. 06-05-2020 12:48 AM
- Karma Re: Splunk and OpenLDAP: Is there a setting in authentication.conf or another configuration file to allow custom filtering? for acharlieh. 06-05-2020 12:48 AM
- Got Karma for Re: What exactly do you mean by a provider in hunk?. 06-05-2020 12:48 AM
- Got Karma for Re: Splunk Analytics for Hadoop licensing model. 06-05-2020 12:48 AM
- Got Karma for Re: How to configure certificate on port 8089?. 06-05-2020 12:48 AM
- Got Karma for Re: How to configure certificate on port 8089?. 06-05-2020 12:48 AM
Topics I've Started
No posts to display.
06-22-2018
01:34 PM
1 Karma
Interesting! I will reach out to education and see what is going on.
... View more
06-22-2018
12:33 PM
2 Karma
Hi ddrillic,
You are definitely looking at an old version of the spec files. Are you working with a version of Splunk that is earlier than 6.4?
In the later versions of Splunk:
"sslCertPath" is deprecated, we now use "clientCert" instead
"sslRootCAPath" has been deprecated entirely.
In inputs.conf
"rootCA" is deprecated.
I do think there are probably some things we can do to make the files more compatible, I'm working with dev on that. Thank you for bringing this up.
Thanks,
jen
... View more
01-25-2018
01:56 PM
Hi there,
I write the docs for the securing spunk manual. I wanted to pop in to say that the community article you are looking at is not really correct for version 6.4 or later.
https://docs.splunk.com/Documentation/Splunk/7.0.1/Security/ConfigureSplunkforwardingtousesignedcertificates#Configure_your_forwarders_to_use_your_certificates is definitely the most up to date topic.
And feel free to review that topic as well, I'm always looking for ways to improve the docs!
Cheers,
Jennifer
... View more
01-02-2018
04:42 PM
The port should default to 9997.
Is there any chance that port is already in use? If so Splunk would use another port.
You could also try manually setting the ports to something that works for you.
This topic offers some guidelines for s configuring your spec file attributes:
http://docs.splunk.com/Documentation/Splunk/Security/ConfigureSplunkforwardingtousesignedcertificates.
... View more
12-06-2017
10:50 AM
The second link i posted should really be the helpful one. The first one is a link to the docs, which may not be specific enough (but might be a good place to start exploring if you want to build and install your own certificates).
But the second link has the security advisory with good links and some scripts. I've posted it below. If that does not help, let me know and I'll do a little more digging. it's definitely a known issue.
PRODUCT ADVISORY: Pre 6.3, Splunk Enterprise, Splunk Light and HUNK default root certificates expire on July 21, 2016. <br/>(Updated: May 19, 2016)
SUMMARY
Instances of Splunk Enterprise, Splunk Light and HUNK that are older than 6.3 AND that are using the default certificates will no longer be able to communicate with each other after July 21, 2016 unless the certificates are replaced OR Splunk is upgraded to 6.3 or later.
Please note that for all Splunk Enterprise versions, the default root certificate that ships with Splunk is the same root certificate in every download. That means that anyone who has downloaded Splunk has server certificates that have been signed by the same root certificate and would be able to authenticate to your certificates. To ensure that no one can easily snoop on your traffic or wrongfully send data to your indexers, we strongly recommend that you replace them with certificates signed by a reputable 3rd-party certificate authority.
IMPACT
Failure to replace expired certificates prior to this will result in the immediate cessation of network traffic for any connection which uses them.
Expiration of Splunk certificates does not affect:
1) Splunk instances that are in Splunk Cloud
SSL certificates used for Splunk Cloud instances are not the default Splunk certificates<br/>
Forwarder to Splunk Cloud traffic is not impacted, however, relay forwarders (forwarder to forwarder) can be impacted if you chose to use default Splunk certificates for this communication
2) Splunk instances that use certificates that are internally generated (self-signed) or obtained from an external Certificate Authority (CA).
3) Splunk instances in your configuration that are upgraded to 6.3 or above and use that version’s root certificates.
4) Splunk instances that do NOT use SSL - (This is the default configuration for forwarder to indexer communication)
Certificate expiration DOES affect Splunk deployments where:
Any or all Splunk instances in your deployment run a release prior to 6.3 and use Splunk default certificates. This includes
Search Heads<br/>
Indexers<br/>
License Masters<br/>
Cluster Masters<br/>
Deployers<br/>
Forwarders
<br/>
RECOMMENDATIONS
There are several options that you can take to resolve certificate expiration. You must take action prior to July 21, 2016.
1) Remain at your current Splunk version (pre- 6.3) and manually upgrade the current default root certificates with the provided shell script that is appropriate for your operating system. Note that the shell script only replaces the current default root certificate with a new (cloned) certificate with a future expiration date. The script does not replace a Splunk default certificate with your own certificate.
The script is available at:
http://download.splunk.com/products/certificates/renewcerts-2016-05-05.zip
Update: minor script changes to update messages and remove redirect of stderr to /dev/null when checking OpenSSL version
Please be sure to read the README.txt included in the zip file before running the script.
2) Upgrade all Splunk instances in your environment to 6.3 or above and use self-signed or CA-signed certificate. We strongly recommend this as the most secure option. Replace current default root certificates with your own certificates. Download the following document to learn about hardening your Splunk infrastructure:
Splunk Security: Hardening Standards
3) Remain at your current Splunk version (pre- 6.3) and use self-signed or CA-signed certificate. Replace current default root certificates with your own certificates. Download the following document to learn about hardening your Splunk infrastructure.
Splunk Security: Hardening Standards
4) Upgrade ALL Splunk instances to 6.3 or above and use those default root certificates. Note: Prior to the upgrade, if in use please remove the existing Splunk default certificate copies of ca.pem and cacert.pem Refer to: Upgrading my Splunk Enterprise 6.2.x to 6.3.x did not upgrade the expiration dates on my default SSL certs, why?
... View more
12-05-2017
09:20 AM
the 6.4.0 version of the docs has some renamed SSL attributes, so if you are still running 6.2, make sure to use that version of the manual, so:
http://docs.splunk.com/Documentation/Splunk/6.2.0/Security/Howtoself-signcertificates
Also, we wrote a Product Advisory specific to this issue for pre-6.3 versions of Splunk, you can find it in this Answers post along with some other possibly helpful bits of information:
https://answers.splunk.com/answers/395886/for-splunk-enterprise-splunk-light-and-hunk-pre-63.html
Hope that helps!
... View more
06-15-2017
08:56 AM
I think this topic in the Splunk documentation should help you with your problem:
http://docs.splunk.com/Documentation/Splunk/6.6.1/Security/BestpracticeforremovinganLDAPuser
... View more
02-09-2017
01:37 PM
2 Karma
Doh, I'm sorry, you are right. For CA-signed certificates you do need the chain. They need to be in the following order:
[ server certificate]
[ intermediate certificate]
[ root certificate (if required) ]
so maybe the issue is the order in the chain?
I am thinking that if you have
"chain.pem : CA Root + intermediary
fullchain.pem: I made it as mycert.pem + chain.pem"
Then I think this should give you an end result of
[ server certificate]
[ root certificate (if required) ]
[ intermediate certificate]
So you might try troubleshooting by changing that order to the first example see if it helps. It seems odd that your certs would check out okay but not work, but SplunkWeb cert configs can be surprisingly touchy. (Oh, and also make sure you are using the version of OpenSSL provided with Splunk!)
Hope this is a little more helpful.
Cheers,
jen
... View more
02-09-2017
01:10 PM
Are you configuring this on 6.5 or later? The attributes for earlier versions are slightly different, so if you are by any chance working in an earlier version, the attributes above will not work.
For serverCert, I would change the value to your mycert.pem file.
... View more
10-03-2016
01:40 PM
5 Karma
We don't have a specific topic dedicated to this question in the docs right now, but the following topic might help answer your question about where to set the server.conf stanza:
http://docs.splunk.com/Documentation/Splunk/6.5.0/Security/Securingyourdeploymentserverandclients
[settings]
enableSplunkWebSSL = true
privKeyPath = etc/auth/splunkweb/mySplunkWebPrivateKey.key
serverCert = etc/auth/splunkweb/mySplunkWebCertificate.pem
cipherSuite =
You might also find the server.conf topic helpful: http://docs.splunk.com/Documentation/Splunk/6.5.0/Admin/Serverconf
SSL Configuration details
[sslConfig]
* Set SSL for communications on Splunk back-end under this stanza name.
* NOTE: To set SSL (eg HTTPS) for Splunk Web and the browser, use
web.conf.
* Follow this stanza name with any number of the following attribute/value
pairs.
* If you do not specify an entry for each attribute, Splunk will use the
default value.
enableSplunkdSSL =
* Enables/disables SSL on the splunkd management port (8089) and KV store
port (8191).
* Defaults to true.
* Note: Running splunkd without SSL is not generally recommended.
* Distributed search will often perform better with SSL enabled.
... View more
09-30-2016
10:51 AM
1 Karma
Same product, new name!
There is one difference: Hunk Archive functionality is now integrated into Splunk Enterprise as "Hadoop Data Roll". But once you install your Splunk Analytics for Hadoop license, the experience will be pretty much the same as when it was called "Hunk". Except more seamless.
... View more
08-30-2016
10:51 PM
1 Karma
Dwaddle's talk is amazing, I recommend it highly.
We also have a topic here that talks about using signed certificates in your indexer to forwarder configuration:
http://docs.splunk.com/Documentation/Splunk/6.4.3/Security/ConfigureSplunkforwardingtousesignedcertificates
Hope that helps!
jen
... View more
03-24-2016
10:41 AM
2 Karma
Yep, the provider is simply whoever is hosting your data. It could be Hadoop, or it could be something like s3 or NoSQL.
An ERP - External Results Provider - is a process. It's provided by Splunk (unless you write your own), It uses info you configure about the provider to communicate with and gather the result from the Provider (i.e., Hadoop). When you configure a Provider, you are technically configuring an ERP as well, because that's the info the ERP uses.
I think this naming convention is a little confusing, I'll see if I can make the docs a little more clear.
... View more
02-03-2016
01:02 PM
3 Karma
Hi there,
This is more of an app issues, I think, than a SHC issue. Passwords do not currently get hashed in app directories. So we recommend that you create a different cert (with the same CA) so as not to expose the SSL password you use elsewhere. We talk about this issue (and workaround) a bit in this topic:
http://docs.splunk.com/Documentation/Splunk/6.1.9/Security/ConfigureSplunkforwardingtousesignedcertificates
Specifically:
Warning: If you configure inputs.conf or outputs.conf in an app directory, the password is NOT encrypted and the clear-text value remains in the file. For this reason, you may prefer to create different certificates (signed by the same root CA) to use when configuring SSL in app directories.
Hope that helps.
... View more
01-26-2016
02:48 PM
1 Karma
I'm not clear on your exact configuration, but it sounds like you are doing some indexing on the heavy forwarder and want to know how to validate the forwarder to Splunk connection? If that is the case, this topic might help: http://docs.splunk.com/Documentation/Splunk/latest/Security/Validateyourconfiguration
... View more
01-21-2016
06:39 PM
You might also check out the official docs here: http://docs.splunk.com/Documentation/Splunk/latest/Security/AboutsecuringyourSplunkconfigurationwithSSL
... View more
09-22-2015
12:43 PM
1 Karma
Great, look forward to hearing back about how things go. I'm the writer for the topics so please let me know if you find something that is not helpful or something that you think might improve the docs!
... View more
09-22-2015
12:39 PM
1 Karma
It's a good best practice to configure them the same way, I would think. And the the server.pem or saml.pem DEFNITELY need to be same on all the Search heads in a SHC set up so that they can communicate.
... View more
09-22-2015
12:23 PM
4 Karma
You only have to enable SAML on the search head, once you do that, search head cluster behavior will work as normal.
Hope that helps.
... View more
09-14-2015
12:09 PM
2 Karma
Hey there,
Not sure if you have seen the Hunk docs for SHC. We don't go into great detail about search head clustering itself, since that is heavily discussed in the Enterprise documentation, but do offer some Hunk specific information that would hopefully be a helpful companion:
http://docs.splunk.com/Documentation/Hunk/6.2.6/Hunk/Configuresearchheadclustering
Hope that helps!
Cheers,
Jen
... View more
07-21-2015
10:33 AM
3 Karma
You might be missing an attribute. And if that doesn't work, you might try setting SSOMode=strict. Also make sure you have the trusted IP listed in server.conf.
Here's a code sample for web.conf from the Security Manual:
SSOMode = strict
trustedIP = 127.0.0.1,10.3.1.61,10.1.8.81
remoteUser = X-Remote-User
tools.proxy.on = True
The following topic in the Securing Splunk manual might be helpful:
http://docs.splunk.com/Documentation/Splunk/6.2.4/Security/ConfigureSplunkSSO
Hope this helps!
... View more
02-13-2015
01:16 PM
1 Karma
If you made a change on a forwarder, then restarting just the forwarder should be enough to update the configuration. The main point of restarting is just to get your edits to be recognized and added to the configuration.
... View more
02-09-2015
04:14 PM
1 Karma
To the best of my knowledge, you must reinstall. I'm not aware of anyone else having success otherwise, so it remains our best practice for the moment. I'm glad you were able to get it up and running successfully! For purposes of improving the docs, I'll definitely investigate some of the information you've provided.
Glad it worked, thanks for letting us know!
... View more
02-06-2015
02:29 PM
4 Karma
Yes, you should be able to use the exact same process (re-install, make launch.conf edit) on your forwarders to turn on FIPs and get everything communicating properly.
And thanks for pointing out that the FIPs docs could use a little improvement, I'll get to work on those improvements.
Thanks!
... View more
10-22-2014
11:37 AM
5 Karma
The configuration process described in the docs is intended to work for heavy and universal forwarders. I can add a note to the docs to clarify that point.
... View more