Cluster audit log forwarding fails due to self signed certificate in certificate chain
Applies to
- ONTAP 9
- Cluster audit log forwarding
- TLS/SSL
Issue
- When creating a cluster audit log forwarding configuration using tcp-encrypted protocol, the command fails due to a self-signed certificate in certificate chain.
::>cluster log-forwarding create -destination splunk.domain.com -port 514 -protocol tcp-encrypted -verify-server true -facility user
Testing network connectivity to the destination host splunk.domain.com.
Error: command failed: Cannot connect to destination host splunk.domain.com, port 514 from node "cluster01-01". Reason: Failed TLS/SSL handshake: certificate verify failed: self signed certificate in certificate chain. Verify connectivity to desired host or skip the connectivity check with the "-force" parameter.
- Checking the installed certificates, it appears that all required certificates are installed in the admin SVM.
::>security certificate show-user-installed -type server-ca -vserver <adminSVM>