Inter-sidecar communication
Learn about TLS end verification in inter-sidecar communication.
On the Splunk platform, a sidecar can communicate with other sidecars using one of the following connection types:
-
Through the Splunk REST API.
-
Sidecars communicate on the Splunk management port, which is the TCP/IP network port 8089.
-
If you specify settings, such as a
serverCertvalue, in the[sslConfig]stanza of the server.conf file and reload the Splunk platform configuration, the Splunk REST API uses these settings.
To learn more about the Splunk REST API, see Splunk REST API reference. To learn how to reload the Splunk platform configuration, see How to renew TLS certificates.
-
-
Through the direct port of the destination sidecar, for example,
https://localhost:8194.-
Each sidecar uses a server data plane certificate specified in the
serverCertDataplanesetting in the[dataplaneSslConfig]stanza of server.conf to secure its own data plane server. Through a Transport Layer Security (TLS) connection on the direct port, a connecting sidecar can verify the certificate of the destination sidecar.The splunkd process auto-generates all certificates when you start Splunk Enterprise the first time.
-
The Storage, Data Orchestration, Edge Processor Control Plane, and OpAmp sidecars, that support enhanced data management in Splunk Enterprise, use the ephemeral certificate-based authorization which enhances security. This authorization uses digital certificates generated for a specific task. These sidecars configure a server data plane certificate for each session.
-
Localhost sidecars skip hostname verification during TLS connections. The settings of the server certificates do not include the localhost name.
Data management sidecars: the trust stores for TLS verification
Learn which trust stores the data management sidecars use for TLS verification, depending on the inter-sidecar connection type.
-
Storage
-
Data Orchestration
-
Edge Processor Control Plane
-
OpAmp
The trust stores differ based on connection type, as shown in the following table:
| Connection type | Trust store configured in server.conf |
|---|---|
| Splunk REST API |
Defined by the value of one of the settings: To learn about these settings, see Configure TLS certificates for communications on the Splunk management port. |
| Through a direct port |
Defined by the value of the The Splunk platform uses this trust store for server data plane certificates. |
Unsupported settings for sidecar loopback communication
Learn about the settings in the server.conf file that the data management sidecars do not support for loopback communication.
The data management sidecars including Storage, Data Orchestration, Edge Processor Control Plane, and OpAmp do not support certain settings in the server.conf file. These settings are related to loopback communication, which is the communication within the same host. The following settings are unsupported:
[sslconfig] stanza
-
requireClientCert -
sslCommonNameToCheck -
sslAltNameToCheck
[pythonSslClientConfig] stanza
-
sslVerifyServerName