Configure the TLS Certificate
If the computer on which you're running the Splunk ODBC Driver is across a firewall from your Splunk platform server, instruct the driver to verify a signed certificate upon connection with the server. To do this, install a valid certificate for the management port on your Splunk platform server, and enable the Verify Server SSL Certificate option in the driver.
Be aware that if you instruct the driver to verify a signed certificate, you must configure a TLS certificate on your Splunk platform server. (The default self-signed certificate is not sufficient.) Not configuring a certificate on your Splunk platform server causes the connection to fail.
To set up this functionality:
- On your Splunk platform server, configure one or more certificates.
- Point splunkd (the Splunk software back-end) to your certificate files by editing
server.conf
. Here's an example of an editedsslConfig
stanza:[sslConfig] enableSplunkdSSL = true sslKeysfile = server.pem sslKeysfilePassword = password caCertFile = cacert.pem caPath = $SPLUNK_HOME/etc/auth
- On the computer on which you've installed the Splunk ODBC Driver, follow the instructions in "Configuration" to open the Splunk ODBC Connection Options window.
- Check the box next to Verify Server SSL Certificate.
Note: Do not set requireClientCert
to true
in server.conf
. The Splunk ODBC Driver does not use an SSL client certificate, so this setting causes the connection to fail.