Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Setting up splunk admin could be easier #226

Closed
kreeuwijk opened this issue Apr 12, 2019 · 0 comments · Fixed by #242
Closed

Setting up splunk admin could be easier #226

kreeuwijk opened this issue Apr 12, 2019 · 0 comments · Fixed by #242

Comments

@kreeuwijk
Copy link
Contributor

For the refactored master branch, I was getting “No users exist. Please set up a user.” in the Splunk web console after installation (using the splunk::enterprise class).
To solve this, I had to add the manage_password => true and password_content => <valid content> attributes.

It works with a correct password_content value but that is difficult to generate if you don’t have an existing server to glen the /opt/splunk/etc/passwd file from...

It would probably be better if one of the methods documented here were used to seed a default password, so at least the admin account gets setup.

The user-seed.conf method didn’t work for me however. The create admin credentials via REST method did work.

ody added a commit to ody/puppet-splunk that referenced this issue Jun 28, 2019
	This commit introduces a new set of parameters that can be used
	instead of the previous "manage_password" parameter to set the
	initial admin password through the documented user-seed.conf
	method. The old method still exists but now logs a message
	indicating that it is no longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jun 28, 2019
	This commit introduces a new set of parameters that can be used
	instead of the previous "manage_password" parameter to set the
	initial admin password through the documented user-seed.conf
	method. The old method still exists but now logs a message
	indicating that it is no longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jun 28, 2019
	This commit introduces a new set of parameters that can be used
	instead of the previous "manage_password" parameter to set the
	initial admin password through the documented user-seed.conf
	method. The old method still exists but now logs a message
	indicating that it is no longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 12, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 12, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 12, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 12, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 12, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 13, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 17, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 17, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 17, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
ody added a commit to ody/puppet-splunk that referenced this issue Jul 17, 2019
	This commit introduces a new set of parameters and classes that
	are used instead of the previous implementation of the
	"manage_password" parameter to set the initial admin password
	through the documented user-seed.conf method. The old method
	still exists but now logs a message indicating that it is no
	longer the preferred method.

	This is being done to align the module with Splunk's
	documentation, prevent Puppet from causing a correctional change
	on each run, and make it possible to reset the admin password
	from the Splunk console when desired.

	The new seed method was implemented in a class separate from
	Class[splunk::{enterprise,forwarder}::config] to enable it to be
	easily used external from Puppet, specifically with a Bolt Plan
	in mind so people can reset the seeded admin password easily
	without the need to temporarily change infrastructure data sets.

	The old direct management method was migrated to the same method
	just for consistency.

	Fixes voxpupuli#226
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant