![]() Writing new private key to 'private_key.pem' ![]() Provide the details when prompted and ensure the Common Name matches the FQDN or the management IP address of the ~]# openssl req -x509 -newkey rsa:4096 -keyout private_key.pem -out selfsigned-cert.pem -days 3650 # openssl rsa -in private_key.pem -out private_key_nocrypt.pem # openssl req -x509 -newkey rsa:4096 -keyout private_key.pem -out selfsigned-cert.pem -days 3650 Generate a new self-signed certificate from a Unix host using the openssl command. Make sure the certificate file is transferred to the Splunk instance where the PureStorage Unified Add-on is certifi]# lsĬacert.pem core.py _init_.py _main_.py certifi]# cat /tmp/fa_pure.crt > cacert.pemġ. Open the $SPLUNK_HOME/etc/apps/TA-purestorage-unified/bin/ta_purestorage_unified/aob_p圓/certifi/cacert.pemfile in an editor and paste the certificate at the end of the file.Īlternatively, if you have downloaded the certificate, you can concatenate the certificate file to the cacert.pem file. Copy the certificate or download the certificate.ħ. ![]() Export the certificate that was just created from the SSL Certificate frame under the Settings=>System tab.Ħ. Accept it to establish a new secured connection.ĥ. After five seconds, the FlashArray GUI is reloaded prompting you with the warning message about the certificate. After providing all the details, click Create and select Yes to override the current certificate.Ĥ. ![]() The entry you are providing against Common Name should resolve to the Array either through DNS or the hosts file on the Splunk server.ģ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |