Installation

How do we validate Splunk UF password change?

bbaker070
Observer

We are attempting to change the password across all Universal forwarders using the command found in this link which references this command:

./splunk edit user admin -password 'fflanda$' -role admin -auth admin:changeme

 

Everything seems to run with no errors, however, how do we validate the password was actually changed to the correct one?

 

Prior to the change I would remotely browse a host with a UF (https://IP ADDRESS:8089) > Click on services > enter admin followed by default password and it would proceed to authenticate me.

 

After the password change I would follow the same process but instead the password box kept re-occurring after every password attempt indicating that the password may not have been set correctly.

 

How would we validate that the actual password has been change on the UF?

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...