<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict Index access in Security</title>
    <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97957#M14201</link>
    <description>&lt;P&gt;You can use/modify authorize.conf by adding something like this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[role_myRole]&lt;BR /&gt;
srchFilter = "index!=blacklisted_index OR index!=myotherBlacklistedIndex"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;EDIT:&lt;/EM&gt;  removed the recommendation for placing the authorize.conf under etc/system/local. The member below makes a good point about using Deployment Server to push authorize.conf out to search heads.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;- please upvote if you find this answer useful&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Oct 2011 20:00:01 GMT</pubDate>
    <dc:creator>_d_</dc:creator>
    <dc:date>2011-10-25T20:00:01Z</dc:date>
    <item>
      <title>Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97956#M14200</link>
      <description>&lt;P&gt;Hi.  We are looking to restrict access to just a few of our many indexes in Splunk.  In the Role rights under Access Controls, the default is for each user level to have rights to "All non-internal Indexes"&lt;/P&gt;

&lt;P&gt;Obviously, for our default "user" group, we could specifically allow access to each individual index except those we want to restrict, but this presents a management problem when new indexes are added (we have to then update those rights to include the newly-created index on each of our Search Heads).&lt;/P&gt;

&lt;P&gt;Is there a way to &lt;EM&gt;blacklist&lt;/EM&gt; indexes?  That is, "All indexes except Internal and X, Y, and Z" ?&lt;/P&gt;

&lt;P&gt;Or are we stuck manually managing access to indexes whenever we add them?&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2011 19:46:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97956#M14200</guid>
      <dc:creator>Sqig</dc:creator>
      <dc:date>2011-10-25T19:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97957#M14201</link>
      <description>&lt;P&gt;You can use/modify authorize.conf by adding something like this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[role_myRole]&lt;BR /&gt;
srchFilter = "index!=blacklisted_index OR index!=myotherBlacklistedIndex"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;EDIT:&lt;/EM&gt;  removed the recommendation for placing the authorize.conf under etc/system/local. The member below makes a good point about using Deployment Server to push authorize.conf out to search heads.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;- please upvote if you find this answer useful&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2011 20:00:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97957#M14201</guid>
      <dc:creator>_d_</dc:creator>
      <dc:date>2011-10-25T20:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97958#M14202</link>
      <description>&lt;P&gt;Judging by $SPLUNK_HOME/etc/system/README/authorize.conf.spec you can't do a blacklist like you are looking for.&lt;/P&gt;

&lt;P&gt;Best solution:&lt;BR /&gt;
Use deployment server to manage your Search Heads and deploy and authorize.conf to them which controls index access.  You will still have to whitelist the good indexes, but you only have to do it once.  This makes it far easier to keep your security consistent.&lt;/P&gt;

&lt;P&gt;Less optimal solution:&lt;BR /&gt;
You could test out using a Search Filter to exclude access to the index (something like index!="payroll" ), but I think you are better off to actually restrict the use of indexes.&lt;/P&gt;

&lt;P&gt;Getting really fancy:&lt;BR /&gt;
Distribute your indexes.conf to your indexers by deployment server too.  Then to create an index you just edit the indexes.conf in the app going to your indexers and the authorize.conf in the app going to search heads and you have configured everything in one foul swoop.  In one environment I am managing three search heads and four indexers in this way, and as a result I still have hair.&lt;/P&gt;

&lt;P&gt;More info on deployment server:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Aboutdeploymentserver"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Aboutdeploymentserver&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2011 20:08:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97958#M14202</guid>
      <dc:creator>GKC_DavidAnso</dc:creator>
      <dc:date>2011-10-25T20:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97959#M14203</link>
      <description>&lt;P&gt;Well, i am curious to know which setting from authorize.conf your "best solution" will use for blacklisting of indexes? The member is asking for a blacklist as he/she already knows how to whitelist or to restrict users to a particular index.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2011 20:16:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97959#M14203</guid>
      <dc:creator>_d_</dc:creator>
      <dc:date>2011-10-25T20:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97960#M14204</link>
      <description>&lt;P&gt;Good point, I guess I wasn't very clear, I have updated the post now.&lt;/P&gt;

&lt;P&gt;It sounds to me like the member doesn't want to have to maintain a whitelist across multiple search heads.  The deployment server will allow them to maintain the list in a single place, and causes the administrator to evaluate who should have access to each newly created index.  If you are managing indexes and search heads both from deployment server then it can all become one documented process and is more likely to be remembered (in my experience).&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2011 20:45:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97960#M14204</guid>
      <dc:creator>GKC_DavidAnso</dc:creator>
      <dc:date>2011-10-25T20:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97961#M14205</link>
      <description>&lt;P&gt;BTW, you should probably consider Search Head Pooling.  One set of configuration files, shared by all the search heads, may reduce your pain.  You still need to figure out your solution, but at least you won't need to copy it and manage it across all the search heads...&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Configuresearchheadpooling"&gt;Configure Search Head Pooling&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2011 08:28:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97961#M14205</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2011-10-27T08:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97962#M14206</link>
      <description>&lt;P&gt;Hi Dave,&lt;/P&gt;

&lt;P&gt;Is this still the same with Splunk 6? It would be great to have a blacklist of indexes to reduce the overhead of maintaining the whitelist. Ideally I'd be able to configure the user role to access all non internal indexes except for specified secure ones.&lt;/P&gt;

&lt;P&gt;..marty&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2014 23:40:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97962#M14206</guid>
      <dc:creator>marty_lindsay</dc:creator>
      <dc:date>2014-04-23T23:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97963#M14207</link>
      <description>&lt;P&gt;The following previously logged Enhancement Request is related to this question.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;SPL-116541&lt;/STRONG&gt;   Search Index Blacklist&lt;/P&gt;

&lt;P&gt;Add configuration parameter to authorize.conf to disallow the searching of certain indexes. This allows users to search all indexes by default, but keep certain ones blocked.&lt;/P&gt;

&lt;P&gt;Example implementation:&lt;/P&gt;

&lt;P&gt;[role_ninja]&lt;BR /&gt;
srchIndexesAllowed = *&lt;BR /&gt;
srchIndexesDenied = private_index;super_ninjas_only&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:22:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97963#M14207</guid>
      <dc:creator>christopherr_sp</dc:creator>
      <dc:date>2020-09-29T22:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97964#M14208</link>
      <description>&lt;P&gt;Has this enhancement been included in a 7.2.x release yet?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 16:54:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97964#M14208</guid>
      <dc:creator>nick405060</dc:creator>
      <dc:date>2019-04-01T16:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97965#M14209</link>
      <description>&lt;P&gt;No, not yet.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 16:55:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/97965#M14209</guid>
      <dc:creator>christopherr_sp</dc:creator>
      <dc:date>2019-04-01T16:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Index access</title>
      <link>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/556580#M14210</link>
      <description>&lt;P&gt;Has this enhancement been added in 8.1.4, or 8.2.0?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 20:04:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restrict-Index-access/m-p/556580#M14210</guid>
      <dc:creator>Akeydel</dc:creator>
      <dc:date>2021-06-21T20:04:21Z</dc:date>
    </item>
  </channel>
</rss>

