<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Encrypted information from deployer to search head in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327323#M12239</link>
    <description>&lt;P&gt;We want to use splunk deployer to push our addon to the search headers, but have questions about the encrypted information.&lt;/P&gt;

&lt;P&gt;First of all, if I understand it right, the addon has to be setup from the deployer, right? The setup link won't even show up in a search head for an addon. &lt;/P&gt;

&lt;P&gt;During the setup of our addon there are some passwords we take from the user, and we need to store them for later use. We post them to the storage/passwords endpoint. So the passwords will be encrypted in the password.conf.&lt;/P&gt;

&lt;P&gt;Now if the deployer push this addon to the search heads, how can they decrypt these please?&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Dec 2017 21:55:42 GMT</pubDate>
    <dc:creator>irsysintegratio</dc:creator>
    <dc:date>2017-12-04T21:55:42Z</dc:date>
    <item>
      <title>Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327323#M12239</link>
      <description>&lt;P&gt;We want to use splunk deployer to push our addon to the search headers, but have questions about the encrypted information.&lt;/P&gt;

&lt;P&gt;First of all, if I understand it right, the addon has to be setup from the deployer, right? The setup link won't even show up in a search head for an addon. &lt;/P&gt;

&lt;P&gt;During the setup of our addon there are some passwords we take from the user, and we need to store them for later use. We post them to the storage/passwords endpoint. So the passwords will be encrypted in the password.conf.&lt;/P&gt;

&lt;P&gt;Now if the deployer push this addon to the search heads, how can they decrypt these please?&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2017 21:55:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327323#M12239</guid>
      <dc:creator>irsysintegratio</dc:creator>
      <dc:date>2017-12-04T21:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327324#M12240</link>
      <description>&lt;P&gt;The way that this is generally done is that BEFORE you start a Splunk instance on your Search Head for the first time, you copy a known &lt;CODE&gt;splunk.secret&lt;/CODE&gt; file (or create one, it is just a certain number of characters in a row) to each server.  When Splunk starts for the first time, it uses this seed to create several encryption keys which are then used to encode/decode passwords.  If you did this (and any PS guy worth anything would have done this for you if you paid somebody to setup your cluster), then you just encrypt it on any search head (or other server that was started with the same &lt;CODE&gt;splunk.secret&lt;/CODE&gt; file) and push out the post-encrypted password from inside the file where it is supposed to reside.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2017 23:08:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327324#M12240</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-12-04T23:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327325#M12241</link>
      <description>&lt;P&gt;Thanks for your information!&lt;/P&gt;

&lt;P&gt;I want to make sure I understand this right. &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Start a new deployer. It will generate a splunk.secret file automatically (in $SPLUNK_HOME/etc/auth);&lt;/LI&gt;
&lt;LI&gt;copy this splunk.secret file to a new search head before starting it the first time. Then the search head will use this splunk.secret as the seed to create keys? Those keys will then be the same as the keys used by the deployer?&lt;/LI&gt;
&lt;LI&gt;Then an encrypted password in password.conf can be pushed from the deployer to the search head, because both the deployer and the search head are now using the same key to encrypt/decrypt?&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 13:50:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327325#M12241</guid>
      <dc:creator>irsysintegratio</dc:creator>
      <dc:date>2017-12-05T13:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327326#M12242</link>
      <description>&lt;P&gt;Hmmmm....&lt;/P&gt;

&lt;P&gt;There is one disadvantage of this approach. It relies on the setup of the search heads. We develop addon for customers, and there is no guarantee that all the customers will setup their search heads like this. As a matter of fact, this is not mentioned in the guideline about setting up search cluster. &lt;/P&gt;

&lt;P&gt;I imagine, some if not most customers did not setup their search cluster this way. Then this approach won't work.&lt;/P&gt;

&lt;P&gt;Is it possible to get the (decrypted) pass4SymmKey via the splunk sdk? Then we can use it to generate a key. Since this is for sure the same for the deployer and all search heads, then we don't need to rely on the splunk.secret?&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 14:53:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327326#M12242</guid>
      <dc:creator>irsysintegratio</dc:creator>
      <dc:date>2017-12-05T14:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327327#M12243</link>
      <description>&lt;P&gt;You've got it.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 16:18:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327327#M12243</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-12-05T16:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327328#M12244</link>
      <description>&lt;P&gt;I believe that there is a REST endpoint for that, but have never looked for it.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 16:19:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327328#M12244</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-12-05T16:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327329#M12245</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;

&lt;P&gt;I will look for the REST endpoint.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 21:06:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/327329#M12245</guid>
      <dc:creator>irsysintegratio</dc:creator>
      <dc:date>2017-12-05T21:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted information from deployer to search head</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/693762#M28375</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1406"&gt;@woodcock&lt;/a&gt;&amp;nbsp;this is old topic however&amp;nbsp;just want to know if pushing addon from deployer using encrypted credentials in new local/passwords.conf (previously encrypted by clustered search head) is different in term of behavior &amp;nbsp;&amp;nbsp;than configuring addon on search head (web UI) and letting SHC replicating passwords.conf?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 16:24:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Encrypted-information-from-deployer-to-search-head/m-p/693762#M28375</guid>
      <dc:creator>splunkreal</dc:creator>
      <dc:date>2024-07-18T16:24:32Z</dc:date>
    </item>
  </channel>
</rss>

