- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Need a list of all the locations of hashed password based on splunk.secret

Is there a list of all possible instances of hashed passwords in Splunk that are based on the splunk.secret? I'm investigating what the effort is to get our splunk.secret in sync for existing servers that don't have matching splunk.secret.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

# grep -ri \$1\$. *
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

care to expand on this?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

This command (after you do cd $SPLUNK_HOME
) will show you any file which contains a splunk-encrypted password (and a whole bunch of other binary files, *.js files and other irrelevant junk). The (properly filtered output) will show you which files WILL BREAK when you change the secret
file. You then go figure out how to re-input the password for those "things". For example, many people use LDAP
for authentication to get into Splunk search heads. This means that the Search Head stored credentials to access AD. This password is encrypted with the secret
and stored in $SPLUNK_HOME/etc/system/local/authentication.conf
as bindDNpassword
. If this is the case for you, then this file will be identified by the grep
command.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

I was looking for an explanation of the regex but your explanation of the issue is spot on. Still very useful for anyone stumbling upon this answer.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Also, please contact me (email is in my profile) and let me know how your research turned out (I am trying to do the same thing: sync splunk.secret
on production system already up and running).
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

I was able to accomplish this with little-to-no issues but I also wasn't doing it on a system with lots of additional hashed values.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

I think that you should click Accept
to close the question since the answer is a good (if terse) one.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Ain't my question otherwise I would.
