Security

Audit Default Admin Creds?

muebel
SplunkTrust
SplunkTrust

Something that should be done for hardening a default installation of Splunk is changing the default admin password. In fact, this is suggested on the login page if the password is still set to the default.

Does anybody know if the status of the admin password is retrievable through internal/audit logging, or the rest interface? Splunk seems to know about itself in this way, and I'd like to audit for it.

One way is a simple script that attempt to auth against the instance using the default creds, but it would be cleaner to leverage existing logging.

DMohn
Motivator

You can check the internal _audit index for password changes of the admin user:

 index=_audit user=admin action=password*

This will show you all events where a password change has been issued for the admin user. Even the initial pw change during first login will be captuerd.

Still, this will not tell you if the password was reset to the initial one, but it gives you an idea, if any changes have been made at all!

0 Karma

lukejadamec
Super Champion

You can create an input to monitor the passwd file. It will allow you to track all changes to passwords and differentiate by host. It will not tell you exactly what the password is because it is encrypted, but if the input is included as part of the install then it will show you if the admin password was changed.

inputs.conf

[monitor://$SPUNK_HOME\etc\passwd]
disabled = false
sourcetype = passwd
0 Karma

muebel
SplunkTrust
SplunkTrust

Thanks for the answer, but I'm looking for something out-of-the-box to a greater degree. Additionally, indexing passwd doesn't seem ideal.

0 Karma

msmith4
New Member

Like you mentioned, using REST api to authenticate with default pass using Wget or curl would be the easiest test case. And also most reliable one.

0 Karma

muebel
SplunkTrust
SplunkTrust

I'm really interested in an out of the box search that will turn up the admin password status of some particular splunk instance, leveraging any of the internal-type indexes (internal, audit, introspection) or otherwise something through REST.

It seems that Splunk has this data available to itself at least, and uses it to warn users at the login page, but from reading the documentation, I'm not finding this available otherwise.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...