<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: set maintenance mode for indexer cluster with hashed password in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599562#M16124</link>
    <description>&lt;P&gt;I am actually trying to do this as a shell script for yum update.&lt;/P&gt;&lt;P&gt;Probably schedule maintenance mode on the master node first then set hourly intervals per indexer to offline and yum update and reboot&lt;/P&gt;&lt;P&gt;I have enable boot start for the Splunk so technically the splunk service starts up automatically on reboot&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2022 10:27:22 GMT</pubDate>
    <dc:creator>leonaheidern2</dc:creator>
    <dc:date>2022-05-27T10:27:22Z</dc:date>
    <item>
      <title>How to set maintenance mode for indexer cluster with hashed password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599549#M16122</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi all&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;I am having issues trying to script enabling and disabling maintenance mode with a hashed password.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;The command is /opt/splunk/bin/splunk enable maintenance -mode - auth admin: somepassword&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Is there a way I can hash the password. I have tried the hash-passwd and user-seed.conf but it does not seem to hash my clear text password upon restarting splunk&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:13:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599549#M16122</guid>
      <dc:creator>leonaheidern2</dc:creator>
      <dc:date>2022-05-27T15:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: set maintenance mode for indexer cluster with hashed password</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599555#M16123</link>
      <description>&lt;P&gt;Even if you could, that wouldn't increase your script security. As long as you're storing authentication data which can be provided in the clear to authenticate your user, it's prone to leakage and abuse. Storing it as "hashed" value if you can authenticate yourself with this hashed value effectively makes it cleartext.&lt;/P&gt;&lt;P&gt;Anyway, you can use REST to put cluster in maintenance mode. &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.6/RESTREF/RESTcluster#cluster.2Fmanager.2Fcontrol.2Fdefault.2Fmaintenance" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.6/RESTREF/RESTcluster#cluster.2Fmanager.2Fcontrol.2Fdefault.2Fmaintenance&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 09:54:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599555#M16123</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-05-27T09:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: set maintenance mode for indexer cluster with hashed password</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599562#M16124</link>
      <description>&lt;P&gt;I am actually trying to do this as a shell script for yum update.&lt;/P&gt;&lt;P&gt;Probably schedule maintenance mode on the master node first then set hourly intervals per indexer to offline and yum update and reboot&lt;/P&gt;&lt;P&gt;I have enable boot start for the Splunk so technically the splunk service starts up automatically on reboot&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 10:27:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599562#M16124</guid>
      <dc:creator>leonaheidern2</dc:creator>
      <dc:date>2022-05-27T10:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: set maintenance mode for indexer cluster with hashed password</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599571#M16125</link>
      <description>&lt;P&gt;Typically yum update should not require stopping splunkd as such. There is almost no real important dependencies that could interfere with splunk as the packages are updated. Of course if you need to reboot to upgrade kernel or systemd (why would you want to reboot otherwise?) you want to use maintenance mode.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 11:02:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599571#M16125</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-05-27T11:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: set maintenance mode for indexer cluster with hashed password</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599572#M16126</link>
      <description>&lt;P&gt;I actually do. It's usually because of kernel patches that's why I have to reboot. Hence was thinking of an automated way to deal with the indexer cluster and master node. Currently I am doing this manually monthly.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 11:13:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599572#M16126</guid>
      <dc:creator>leonaheidern2</dc:creator>
      <dc:date>2022-05-27T11:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: set maintenance mode for indexer cluster with hashed password</title>
      <link>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599574#M16127</link>
      <description>&lt;P&gt;So any way of authentication that can be used in such batch operation has to rely on stored authentication data. Whether it's a plaintext password, password hash, ssh key, x509 certificate, you still have to "show" something to the entity you want to authenticate yourself to. That's a common problem with all "static" authentication mechanisms. You'd have to have some completely different authentication schema to avoid the possible impersonation problem.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 11:46:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-set-maintenance-mode-for-indexer-cluster-with-hashed/m-p/599574#M16127</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-05-27T11:46:44Z</dc:date>
    </item>
  </channel>
</rss>

