Greetings,
I'm running Splunk Enterprise on a Windows Server (requirement driven). The Windows Server & Splunk have FIPS Mode Enabled (another requirement).
The Splunk Process (splunkd.exe) is causing the windows server to generate an excessive number of 6417 events (The FIPS mode crypto selftests succeeded) in the local Windows Security Log, creating excessive noise in the logs (4,500/hr) and eating up HDD space.
Any indication why and/or steps I can take to limit beyond turning off FIPS?
... View more