Solved

Splunk Active Directory Add-on

Posted on 2015-02-13
6
370 Views
Last Modified: 2015-02-13
Hi,
I have just installed splunk enterprise, I want to monitor windows data etc.
I installed the Add-on for active director App and the windows app and am trying to configure them. I have opened the AD App and have started configuring using the wizard. I have entered the following parameters:
Domain name = mydomain.ie
Alternate Domain name = mydomain
LDAP Server:
                  Hostname = ip address of domain controller
                  port = 389
                  ssl = blank
Credentials:
                  Bind DN = mydomain\domain admin username
                  Password = Domain admin user password

When I hit test I get an error:
could not access the directory service at ldap://DC IP Address:389 ldapinvalidcredentialsresult - 49 - invalidcredentials - none - 80090308: ldaperr: dsid-0c0903a9, comment: acceptsecuritycontext error, data 52e, v1db0 - bindresponse - none"

I some time also get an error stating the Alternate domain name is in the domain please correct,

Any ideas what I am doing wrong here, the splunk documentation is not very helpful for a novice

Thanks
0
Comment
Question by:padraic Carron
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 500 total points
ID: 40608021
From the info you you posted up it looks like your Bind DN is incorrect. Distinguished names normally take the form of.

CN=username,OU=People,DC=domain,DC=com

The easiest way to get the correct DN is to use ADSI edit and browse to the account you want to use, select it, right cick and choose properties. You will want to copy the distinguished name field.
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 40608024
Actually heres an even easier way to get your DN. From any computer with Microsoft AD powershell cmdlets installed run the following command

get-aduser {admin username}  | select-object distinguishedname
0
 

Author Comment

by:padraic Carron
ID: 40608302
Thanks that seemed to work, but when I go to save it fails on the Alternate domain name.
I have put in the paramaters:
Domain name = mydomain.ie
Alternate Domain = mydomain
The error is "This domain is in use by the mydomain.ie"
0
Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 
LVL 35

Expert Comment

by:Joseph Daly
ID: 40608330
I'm not too familiar with the product you are using but my two suggestions would be.

1. You may not need the additional domain name.

2. It may be referring to your DNS domain name versus your netbios domain name.

I would try number 1 first.
0
 

Author Comment

by:padraic Carron
ID: 40608504
I just put in a dummy name and it seemed to work ???
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 40608582
You probably don't need it.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question