<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict access to read only also for admin in Splunk Cloud Platform</title>
    <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709555#M3506</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/247724"&gt;@wealot&lt;/a&gt;- There is no clear document that we can do &lt;STRONG&gt;write: []&lt;/STRONG&gt;, so I would suggest to test following. Not sure if this is best solution, but maybe this will work.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a role called role_for_no_one and do not assign this role to anyone.&lt;UL&gt;&lt;LI&gt;Do not import this role from any other role.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Metadata&lt;UL&gt;&lt;LI&gt;access = read: [*], write: [role_for_no_one]&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!!!&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jan 2025 06:34:09 GMT</pubDate>
    <dc:creator>VatsalJagani</dc:creator>
    <dc:date>2025-01-23T06:34:09Z</dc:date>
    <item>
      <title>Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/708333#M3467</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have an app that is used for all the configurations that we have in Splunk Cloud. Quite a lot of users on our instance are admin (for good reasons that I don't want to get into &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt; ). Now because not all of those users are really "developer enthusiasts" they tend to sometimes make configuration changes through the GUI. For example disable a search in the GUI instead of nicely in the app (with pipeline etc) when they don't need it anymore. To try to make this impossible I changed the default.meta to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[]
access = read : [ * ], write : []
export = system&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But this doesn't seem to work and people can still disable savedsearches (and many other things).&lt;/P&gt;&lt;P&gt;Is there any way to disable write entirely for any content in the app?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 09:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/708333#M3467</guid>
      <dc:creator>wealot</dc:creator>
      <dc:date>2025-01-09T09:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709555#M3506</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/247724"&gt;@wealot&lt;/a&gt;- There is no clear document that we can do &lt;STRONG&gt;write: []&lt;/STRONG&gt;, so I would suggest to test following. Not sure if this is best solution, but maybe this will work.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a role called role_for_no_one and do not assign this role to anyone.&lt;UL&gt;&lt;LI&gt;Do not import this role from any other role.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Metadata&lt;UL&gt;&lt;LI&gt;access = read: [*], write: [role_for_no_one]&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!!!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 06:34:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709555#M3506</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2025-01-23T06:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709567#M3507</link>
      <description>&lt;P&gt;Yes seems that there is only a workaround available by using a non-used role. Although I do not know if this would in fact create issues up the road, we'll see!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 08:05:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709567#M3507</guid>
      <dc:creator>wealot</dc:creator>
      <dc:date>2025-01-23T08:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709568#M3508</link>
      <description>&lt;P&gt;Actually did some further testing, but users with admin privileges seem to be immune to permissions in terms of editing apps. So for now there is no way to disallow admins to write to apps.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 08:40:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709568#M3508</guid>
      <dc:creator>wealot</dc:creator>
      <dc:date>2025-01-23T08:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709615#M3509</link>
      <description>&lt;P&gt;if my answer, answered your question please "Accept it as Solution".&lt;/P&gt;&lt;P&gt;If it helped you anyway, kindly upvote!!!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 16:15:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709615#M3509</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2025-01-23T16:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict access to read only also for admin</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709624#M3510</link>
      <description>&lt;P&gt;Admin is same as root *nix world. You could try different tricks to restrict what it can do, but there is always a way to avoid those restrictions!&lt;/P&gt;&lt;P&gt;To be honest your company must implement policies which are mandatory and if someone doesn’t follow it then there is some consequences for those. Otherwise there will be always some surprises time by time. Of course there should be some other ways to motivate your colleagues first to understand why there is policies and why everyone must following those.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 20:20:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Restrict-access-to-read-only-also-for-admin/m-p/709624#M3510</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-01-23T20:20:59Z</dc:date>
    </item>
  </channel>
</rss>

