You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At the moment changing Splunk.secret will break everything and rerunning ansible playbook will always force configs to be updated and splunk restarted even though the password values are exactly the same.
Should update the tasks related to passwords to do the following
Run a shell command that
runs btool to get the value for the key
if value is empty exit 1
elif value starts with $ use show-decrypted command to decrypt it and return value
else return value
register the value into pass_result
Run a ini_file
run only when pass_result not same as password in inventory
set the password
This should auto update password if it or Splunk.secret has changed.
The text was updated successfully, but these errors were encountered:
The role does not currently support changing the splunk.secret file because as you found out, the splunk.secret file is used in the password hashing process for several different passwords. The role provides the configure splunk.secret option in case you want to use a common splunk.secret file across several hosts during a new installation, which allows you to deploy pre-hashed passwords that are in your VCS via configure_apps.yml. This practice is what we recommend to deploy passwords securely across multiple Splunk hosts. See: https://docs.splunk.com/Documentation/Splunk/8.2.2/Security/Deploysecurepasswordsacrossmultipleservers
The issue that you encountered is also why the configure_splunk_secret.yml task is only called during install_splunk.yml and not during upgrade_splunk.yml - because changing splunk.secret without also updating the passwords in the .conf files and restarting splunk will cause password decryption errors.
Can I ask what your use case is for changing splunk.secret after installation?
Your suggested workaround for the issue could work if we wanted to add a new task specifically for rotating splunk.secret but shouldn't be necessary for something like a password rotation. It's also not safe for us to assume that everyone is using Ansible to manage the passwords in their configuration files, since as I mentioned earlier, you can pre-hash the password in the config files, and then deploy the configs as part of an app. So, in that scenario, there is no variable storing the password in Ansible to compare the decrypted output against.
At the moment changing Splunk.secret will break everything and rerunning ansible playbook will always force configs to be updated and splunk restarted even though the password values are exactly the same.
Should update the tasks related to passwords to do the following
This should auto update password if it or Splunk.secret has changed.
The text was updated successfully, but these errors were encountered: