Splunk’s passwords can be decrypted.
Splunk provides the means to decrypt the passwords.
This trick is useful for times where your old admin didn’t share the pass4SymmKey or other “encrypted” fields in the config. This method became possible after 6.3.0 when passwords.conf was introduced.
Splunk Password Basics
Splunk provides a nice write up of how secrets are stored within configuration files on the file system. It’s important to note that when a clear-text password is detected in a “secret” field, the next restart of Splunk will cause this value to become encrypted using the
splunk.secret value. This value is generated upon first install and is normally different between Splunk installations, meaning that your encrypted values would be different even if the original clear-text value was identical.
Add a passwords.conf file in your favorite config directory, ie.
/opt/splunk/etc/apps/search/local/passwords.conf, with the following contents.
The example from my test instance.
Perform a debug refresh to force Splunk to load this new file into active config. Perhaps a restart if you’re getting a Forbidden on this link. (Free users)
Splunk API for Clear Text
Use the Splunk API to view all the passwords (the one you just added) managed by Splunk via passwords.conf.
You’ll find the clear-text in the clear_password field.
Hope this helps with recovering an unknown password.