12/29/2023 0 Comments Default splunk login“C:\Program Files\Splunk\bin\openssl.exe” x509 -req -in myServerCertificate.csr -sha256 -CA m圜ACertificate.pem -CAkey m圜APrivateKey.key-CAcreateserial -out myServerCertificate.pem -days 1095 Import Response Use the following command to generate a response for the Server Certificate request from the Root CA Certificate. “C:\Program Files\Splunk\bin\openssl.exe” req -new -key myServerPrivateKey.key -out myServerCertificate.csr -config “C:\Program Files\Splunk\openssl.cnf” Sign Server Certificate Request In the example below I am generating a request for The name uses must match the FQDN of your Splunk server. Use the following command to generate a Certificate request that will be signed by the RootCA you have created. “C:\Program Files\Splunk\bin\openssl.exe” rsa -passin pass:1234 -in myServerPrivateKey.key -out myServerPrivateKey.key Create Server Certificate request “C:\Program Files\Splunk\bin\openssl.exe” genrsa -aes256 -passout pass:1234 -out myServerPrivateKey.key 2048 -config “C:\Program Files\Splunk\openssl.cnf” Remove Key phrase from private key “C:\Program Files\Splunk\bin\openssl.exe” x509 -req -in m圜ACertificate.csr -sha512 -signkey m圜APrivateKey.key -CAcreateserial -out m圜ACertificate.pem -days 1095 Create Server Certificate/Create Server Private KeyĬreate a private key for the server certificate Sign the certificate request with the Root CA private key. “C:\Program Files\Splunk\bin\openssl.exe” req -new -key m圜APrivateKey.key -out m圜ACertificate.csr -config “C:\Program Files\Splunk\openssl.cnf Sign Root Certificate Request Use the following command to generate a request for the root certificate – in the example below I called my RootCA – “C:\Program Files\Splunk\bin\openssl.exe” rsa -passin pass:1234 -in m圜APrivateKey.key -out m圜APrivateKey.key Create Root Certificate Request “C:\Program Files\Splunk\bin\openssl.exe” genrsa -aes256 -passout pass:1234 -out m圜APrivateKey.key 2048 -config “C:\Program Files\Splun \openssl.cnf Remove the Key Phrase from the Private Key Make a directory call my “m圜erts” using the command “mkdir m圜erts”Ĭhange to the m圜erts directory Create Root Certificate Authority/Create a Certificate Authority Private Key Change directory to the $SPLUNK_HOME\etc\auth directory of the Splunk installation. Logon through RDP to the Splunk server and start a DOS command window. You can see the certificate does not match the FQDN of the server. Verify the Current Certificate NameĬonnect to port 8089 of your Splunk server through a web browsers using the following format:Ĭlick on the “Certificate (invalid)” message and then select “View Certificate” Please follow the steps below for additional information on how to create the Self-signed SSL certificate. By default Splunk is delivered with a certificate called SplunkServerDefautCert – however for SAP to connect to Splunk the certificate much match the hostname of the server. The purpose of this document is to show the process to generate a self-signed SLL certificate for Splunk that matches the fully qualified domain name of the Splunk server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |