Which path shall i include it from Graylog server and which for the windows server ?
As will be a totally different thing.
then the INPUT beats, i check the TLS part
and in the TLS cert file i actually copy pasted the whole thing and not gave it a path, because it works like that for linux and i presumed the same for windows.
http_enable_tls = true
# The X.509 certificate chain file in PEM format to use for securing the HTTP interface.
http_tls_cert_file = /etc/ssl/certs/iptor/wildcard........pem
# The PKCS#8 private key file in PEM format to use for securing the HTTP interface.
http_tls_key_file = /etc/ssl/certs/iptor/pkcs8-encrypted.pem
# The password to unlock the private key used for securing the HTTP interface.
http_tls_key_password = Secret123!
The logs show the certs are invalid. So that would be my first suggestion.
Second, ensure the Graylog -Sidecar can access those certs. Not sure that path will work in this instance, for testing try putting your certs in Graylog-sidecar directory because if that does not work then for sure you have an issue with your certs.
EDIT: Oh I just seen something in the log file from your first post, and yes I’m blind
This part here…
Meaning if you follow the doc’s it would have been this part here
[req]
distinguished_name = req_distinguished_name
x509_extensions = v3_req
prompt = no
# Details about the issuer of the certificate
[req_distinguished_name]
C = US
ST = Some-State
L = Some-City
O = My Company
OU = My Division
CN = graylog.example.com
[v3_req]
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
extendedKeyUsage = serverAuth
subjectAltName = @alt_names <------------------------ HERE
# IP addresses and DNS names the certificate should include
# Use IP.### for IP addresses and DNS.### for DNS names,
# with "###" being a consecutive number.
[alt_names]
IP.1 = 203.0.113.42 <--------------HERE
DNS.1 = graylog.example.com <-------------HERE