You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -248,6 +249,25 @@ While running a standalone Splunk instance may be fine for testing and developme
248
249
249
250
See the [instructions on standing up a distributed environment](advanced/DISTRIBUTED_TOPOLOGY.md) to understand how to get started.
250
251
252
+
## Enable SSL Internal Communication
253
+
For users looking to secure the network traffic from one Splunk instance to another Splunk instance (ex: forwarders to indexers), you can enable forwarding and receiving to use SSL certificates.
254
+
255
+
If you wish to enable SSL on one tier of your Splunk topology, it's very likely all instances will need it. To achieve this, we recommend you generate your server and CA certificates and add them to the `default.yml` which gets shared across all Splunk docker containers. Use this example `default.yml` snippet for the configuration of Splunk TCP with SSL.
256
+
```
257
+
splunk:
258
+
...
259
+
s2s:
260
+
ca: /mnt/certs/ca.pem
261
+
cert: /mnt/certs/cert.pem
262
+
enable: true
263
+
password: abcd1234
264
+
port: 9997
265
+
ssl: true
266
+
...
267
+
```
268
+
269
+
For more instructions on how to bring your own certificates, please see: https://docs.splunk.com/Documentation/Splunk/latest/Security/ConfigureSplunkforwardingtousesignedcertificates
270
+
251
271
## Build from source
252
272
While we don't support or recommend you building your own images from source, it is entirely possible. This can be useful if you want to incorporate very experimental features, test new features, and if you have your own registry for persistent images.
Copy file name to clipboardExpand all lines: docs/CHANGELOG.md
+21Lines changed: 21 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,7 @@
2
2
3
3
## Navigation
4
4
5
+
*[8.0.2](#802)
5
6
*[8.0.1](#801)
6
7
*[8.0.0](#800)
7
8
*[7.3.4](#734)
@@ -23,6 +24,26 @@
23
24
24
25
---
25
26
27
+
## 8.0.2
28
+
29
+
#### What's New?
30
+
* New Splunk Enterprise release of 8.0.2
31
+
32
+
#### docker-splunk changes:
33
+
* Bumping Splunk version. For details, see: https://docs.splunk.com/Documentation/Splunk/8.0.2/ReleaseNotes/Fixedissues
34
+
* Bugfixes and increasing test coverage for new features
35
+
36
+
#### splunk-ansible changes:
37
+
** Revised Splunk forwarding/receiving plays to optionally support SSL (see documentation on [securing data from forwarders](https://docs.splunk.com/Documentation/Splunk/latest/Security/Aboutsecuringdatafromforwarders))
38
+
* Initial support for forwarder management using [Splunk Monitoring Console](https://docs.splunk.com/Documentation/Splunk/latest/DMC/DMCoverview)
39
+
* New environment variables exposed to control replication/search factor for clusters, key/value pairs written to `splunk-launch.conf`, and replacing default security key (pass4SymmKey)
40
+
41
+
**NOTE** Changes made to support new features may break backwards-compatibility with former versions of the `default.yml` schema. This was deemed necessary for maintainability and extensibility for these additional features requested by the community. While we do test and make an effort to support previous schemas, it is strongly advised to regenerate the `default.yml` if you plan on upgrading to this version.
42
+
43
+
**DEPRECATION WARNING** As mentioned in the changelog, the environment variables `SPLUNK_SHC_SECRET` and `SPLUNK_IDXC_SECRET` will now be replaced by `SPLUNK_SHC_PASS4SYMMKEY` and `SPLUNK_IDXC_PASS4SYMMKEY` respectively. Both are currently supported and will be mapped to the same setting now, but in the future we will likely remove both `SPLUNK_SHC_SECRET` and `SPLUNK_IDXC_SECRET`
0 commit comments