These docs are for Cribl Edge 4.9 and are no longer actively maintained.
See the latest version (4.13).
Secure Leader Using an Existing TLS/SSL Certificate and Key
This page outlines how to protect Cribl Edge Leader to Edge Nodes communications, using an existing TLS/SSL certificate and key.
Cribl Edge expects certificates and keys to be formatted in privacy-enhanced mail (.pem
) format. To generate a self-signed certificate and corresponding key, see Securing Cribl Edge.
Import Certificate and Key
To use your certificate and key to prepare secure communications between Workers/Edge Nodes and the Leader:
- Navigate to the Leader’s Settings > Globals > Security > Certificates > New Certificates modal.
- Open your TLS/SSL certificate file. (The self-signed certificate example in Configure TLS for API and UI Access used the placeholder name
myCert.pem
.) - Copy the file’s contents to your clipboard.
- Paste the file’s contents into the modal’s Certificate field.
You can skip the preceding three steps: Just drag/drop your
.pem
file from your filesystem into the Certificate field, or upload it using the button at the field’s upper right.
- Open your private key file. (The self-signed certificate example in Configure TLS for API and UI Access used the placeholder name
myKey.pem
.) - Copy the file’s contents to your clipboard.
- Paste the clipboard contents into the same Leader modal’s Private key field.
Here again, you can skip the preceding three steps by dragging/dropping or uploading the
.pem
file from your filesystem.
- Fill in the Name and Description fields.
- If you’ve uploaded a self-signed certificate, just Save it now.
- If your private key is encrypted, fill in the modal’s Passphrase with the corresponding key.
(You can paste the key’s contents, or you can drag/drop or upload the key file.) - If you’re uploading a certificate signed by an external certificate authority – For example, a downloaded Splunk Cloud certificate – import the chain into the CA certificate field before saving the certifcate. For details, see Obtain the Certificate Chain (TLS/SSL).