Splunk customers running Splunk version 6.2 and earlier, with default root certificates provided by Splunk, will experience issues with their Splunk deployments starting in a few weeks. This applies to Splunk Enterprise, Splunk Light, and Hunk.

The default root certificates shipped with these Splunk products, version 6.2 and earlier, will expire on July 21, 2016. As a result, the Splunk servers in an affected deployment will not be able to communicate with each other, as each server will refuse connection attempts from other servers utilizing expired certificates.

As a trusted Splunk Professional Services Partner, Function1 has been helping Splunk customers to avoid the potential impact of expired certificates. For some of our customers, we have been replacing the expiring certificates across entire deployments. In other instances we have upgraded Splunk instances to the latest version. 

Broken communication between your Splunk Forwarders, Indexers, and Search Heads will result in an inoperable Splunk instance. For more information about how we can replace your expiring certificates, or upgrade your Splunk instances to the latest version, please send us an email. We'll be in touch within one business day. At Function1, we're always here to help!

The Operational Intelligence Team,

 

Stay In Touch