Generating the Domain name and TLS Certs/key
A series of 4 blogs about Encrypting data in motion between Splunk and Cribl
This is the second part of a blog series about encrypting data in transit between Splunk and Cribl. If you want to learn more about fundamentals, please click here to read part 1.
Let’s get started right away with the prerequisites:
- An instance of the application (in our case, it is Splunk Enterprise) running and published over the internet(in our case) else within the enterprise.
On the high level this is what we are trying to do —
- Ensuring that the application is running and web UI is accessible online.
- Creating a free DNS address, linking its host A record with our public IP.
- Generating a free public CA certificate on the name of the domain we acquired above in step 2.
- Validating that acquired certs and keys are created correctly.
Below are the low-level procedural steps.
Step 1 — Accessing Splunk Enterprise Application Web UI
We have a Splunk all-in-one instance running on AWS over the elastic IP or static IP: 54.157.74.30 DNS address for this is: ec2–54–157–74–30.compute-1.amazonaws.com
We open the application with IP, and AWS native DNS address, and our application is showing web UI correctly.
Step 2 — Domain Name Creation
Now, we are creating a random domain name and associating our IP with the DNS name i.e. banyantree.work.gd and ensuring that our application web UI is opening with it.
Step 3 — Certification Generation
Now, we are getting the certificates made for the domain name banyantree.work.gd
from the dashboard, we can get the below files —
- SSL cert,
2. private key (don't trust this mechanism much for sensitive data transfer, this is good for testing purposes only), and
3. intermediate/root CA certs.
4. as well as the domain CSR — which can be put into the CSR decoder to verify the details.
Step 4 — Validation of generated certs and keys
Result
Now, we have the server cert, key, and intermediate/root CA cert.
This can be used on the Splunk host for data in motion or webUI encryption purposes. This will be covered in the next part of this blog series.
Your comments and suggestions are welcomed.