![]() : : No name matching localhost foundĪt .getSSLException(Alerts.java:192)Īt .fatal(SSLSocketImpl.java:1904)Īt .fatalSE(Handshaker.java:279)Īt .fatalSE(Handshaker.java:273)Īt .serverCertificate(ClientHandshaker.java:1446)Īt .processMessage(ClientHandshaker.java:209)Īt .processLoop(Handshaker.java:913)Īt .process_record(Handshaker.java:849)Īt .readRecord(SSLSocketImpl.java:1023)Īt .performInitialHandshake(SSLSocketImpl.java:1332)Īt .startHandshake(SSLSocketImpl.java:1359)Īt .startHandshake(SSLSocketImpl.java:1343)Īt .(HttpsURLConnectionImpl. Note: If we change the system date to 2015/2016 then this issue is not occurring. Please let us know if there is any known bug available. We are using JRE6, OpenSSL 0.9.8x version in our application. Please let us know the root cause of this exception. we also tried re-generating the certificates and valid date extend up to 2022. We are not sure about the root cause of this exception. We are getting the below exception suddenly when we try to enable the SSL mode for our application running in RHEL 5 OS. In the setup for your JMS stanza there is a field for entering these. The trust store password is used to check the integrity of the data in the trust store before accessing it. This property is used to set the password for the trust store. HandShaker is an application available for Windows, Mac, Android and iOS, which facil Special offer: 45 off with code HOLIDAY Enjoy 100 live channels and savings on your first bill. The default value is TrustStore.getDefaultValue(). Any valid trust store type supported by SSL can be assigned to this property. This property denotes the type of the trust store. ![]() The default value is jssecacerts, if available, or cacerts. The property takes a String value that specifies a valid trust store location. A trust store is a key store that is used when making decisions about which clients and servers can be trusted. This property is used to specify the location of the trust store. ![]() This password value is used to check the integrity of the data in the key store before accessing it. This property specifies the password of the key store. The default value is KeyStore.getDefaultValue(). Any valid key store type supported by SSL can be assigned to this property. This property denotes the type of the key store. Any valid key store location can be assigned to this property. A key store is a database of key material that are used for various purposes, including authentication and data integrity. This property is used to specify the location of the key store. You are using the JMS Messaging Modular Input, so typically you would set JVM system properties for SSL client settings. This is nothing to do with core Splunk configuration. Has anyone been able work through this before or found a guide on how to set this up? All I see is the instructions on how to set up SSL between Splunk's nodes. I really can't find any documentation in Splunk that explains how to import the broker's certificate into Splunk's environment. Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .write(AppOutputStream.java:122) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .writeRecord(SSLSocketImpl.java:702) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .performInitialHandshake(SSLSocketImpl.java:1312) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .readRecord(SSLSocketImpl.java:1016) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .process_record(Handshaker.java:804) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .processLoop(Handshaker.java:868) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .processMessage(ClientHandshaker.java:153) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .serverCertificate(ClientHandshaker.java:1341) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .fatalSE(Handshaker.java:270) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .fatalSE(Handshaker.java:276) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .fatal(SSLSocketImpl.java:1884) Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" at .getSSLException(Alerts.java:192) ![]() Message from "python C:\Splunk\etc\apps\jms_ta\bin\jms.py" Caused by: : : PKIX path building failed: .SunCertPathBuilderException: unable to find valid certification path to requested target ssl://localhost:61617, Splunk throws an exception, since it cannot find the broker's certificate When we change our broker to use SSL i.e. It works fine if the 'JNDI Provider URL' is non SSL such as: We have installed the 'JMS Messaging Modular Input' application in Splunk 6.1. ![]()
0 Comments
Leave a Reply. |