<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to se up Restrictions on App-Level Logs in Splunk? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658223#M17289</link>
    <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am reaching out to seek your valuable inputs regarding setting up restrictions on app-level logs under a particular index in Splunk.&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;The use case is as follows:&lt;/STRONG&gt; We have multiple application logs that fall under a single index. However, we would like to set up restrictions for a specific app name within that index. While we are aware of setting up restrictions at the index level, we are wondering if there is a way to further restrict access to logs at the app level.&lt;/P&gt;
&lt;P class=""&gt;Our goal is to ensure that only authorized users have access to the logs of the specific app within the designated index.&lt;/P&gt;
&lt;P class=""&gt;Thank you in advance for your assistance and expertise. We look forward to your valuable inputs&lt;/P&gt;</description>
    <pubDate>Fri, 22 Sep 2023 18:17:05 GMT</pubDate>
    <dc:creator>Manish_Sharma</dc:creator>
    <dc:date>2023-09-22T18:17:05Z</dc:date>
    <item>
      <title>How to se up Restrictions on App-Level Logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658223#M17289</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am reaching out to seek your valuable inputs regarding setting up restrictions on app-level logs under a particular index in Splunk.&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;The use case is as follows:&lt;/STRONG&gt; We have multiple application logs that fall under a single index. However, we would like to set up restrictions for a specific app name within that index. While we are aware of setting up restrictions at the index level, we are wondering if there is a way to further restrict access to logs at the app level.&lt;/P&gt;
&lt;P class=""&gt;Our goal is to ensure that only authorized users have access to the logs of the specific app within the designated index.&lt;/P&gt;
&lt;P class=""&gt;Thank you in advance for your assistance and expertise. We look forward to your valuable inputs&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 18:17:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658223#M17289</guid>
      <dc:creator>Manish_Sharma</dc:creator>
      <dc:date>2023-09-22T18:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up Restrictions on App-Level Logs in Splunk</title>
      <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658230#M17290</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254533"&gt;@Manish_Sharma&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you can give grants to a role to access an app, then you can give ro the role access to one or more indexes, but when a role has access to one index, you cannot restrict access to a part of it.&lt;/P&gt;&lt;P&gt;If you need to do this you have to apply one of the following workaround:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;in the app, creare distinct dashboard for each role, displaying only the permitted events and disabling access to the direct search form,&lt;/LI&gt;&lt;LI&gt;you can schedule a search that exports the data for the limited users in a summary index (you don't have additional costs) and give access to the restricted uses only to the Summary index.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I prefer the second one that's easier.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 07:24:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658230#M17290</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-21T07:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up Restrictions on App-Level Logs in Splunk</title>
      <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658709#M17295</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Thank you for your valuable response regarding this issue.&lt;/P&gt;&lt;P class=""&gt;The problem is that the index where the app logs are being ingested is shared or a single one for the entire platform. This means we cannot make that index read-only (RO) for a specific role only. Even if we create a different role and give it RO access to that index, the logs will still be visible to other users.&lt;/P&gt;&lt;P class=""&gt;Is there any other solution to this problem, or is the only solution to ingest those app logs into a different index and then apply restrictions to that specific index?&lt;/P&gt;&lt;P class=""&gt;Your insights and suggestions would be greatly appreciated.&lt;BR /&gt;&lt;BR /&gt;Logs format: index=app_platform&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_app_id&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_app_name&lt;/SPAN&gt;:&amp;nbsp;&lt;STRONG&gt;names for different apps&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_org_id&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_org_name&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_space_id&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;cf_space_name&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;deployment&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;event_type&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;ip&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;job&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;job_index&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;message_type&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;msg&lt;/SPAN&gt;:&amp;nbsp;&lt;SPAN class=""&gt;[2023-09-26 05:54:26 +0000] [185] [DEBUG] Closing connection. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;origin&lt;/SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;source_instance&lt;/SPAN&gt;:&amp;nbsp;&lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;source_type&lt;/SPAN&gt;:&amp;nbsp;&lt;SPAN class=""&gt;APP/PROC/WEB&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;timestamp&lt;/SPAN&gt;:&amp;nbsp;&lt;SPAN class=""&gt;1695707666892324540&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 05:57:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658709#M17295</guid>
      <dc:creator>Manish_Sharma</dc:creator>
      <dc:date>2023-09-26T05:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to se up Restrictions on App-Level Logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658710#M17296</link>
      <description>&lt;P&gt;You grant permissions on a per-index basis. That's how Splunk works. And that's one of the main reasons you separate data into multiple indexes.&lt;/P&gt;&lt;P&gt;You can try to do some tricks to restrict visibility to some data that user has access to (by using filters for a role or by giving a user only some predefined dashboards) but those are relatively easily circumventable and I wouldn't rely one them.&lt;/P&gt;&lt;P&gt;So separating your data properly is one of the steps in architecting your environment.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 06:07:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658710#M17296</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-09-26T06:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up Restrictions on App-Level Logs in Splunk</title>
      <link>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658712#M17297</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254533"&gt;@Manish_Sharma&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as I said, it isn't possible to give a partial access to an index, the access grants are on/off.&lt;/P&gt;&lt;P&gt;So the only solution is creating a dedicated summary index (without additional license costs, only storage costs) to that role.&lt;/P&gt;&lt;P&gt;Only to be more detailed: in Splunk all accesses to indexes are read only: it isn't possible to modify any data in indexes and deletion is possible only having the "can_delete" role, and anyway it's a logical deletion, not physical.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 06:22:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-se-up-Restrictions-on-App-Level-Logs-in-Splunk/m-p/658712#M17297</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-09-26T06:22:52Z</dc:date>
    </item>
  </channel>
</rss>

