<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict search command usage (rest in particular) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/750483#M242349</link>
    <description>&lt;P&gt;This is a relatively old thread and I don't recall seeing any of its participants active lately.&lt;/P&gt;&lt;P&gt;Anyway, I don't think you can disable the rest command as such. You can limit the scope of information the user can access (see the list_* capabilities) but I don't think you can prohibit a user from listing indexes on an AIO instalation.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2025 22:15:23 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2025-07-25T22:15:23Z</dc:date>
    <item>
      <title>Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402371#M172946</link>
      <description>&lt;P&gt;I am looking to restrict the use of certain search commands for particular users / roles.&lt;BR /&gt;
In particular I would like users not to be able to use the &lt;CODE&gt;rest&lt;/CODE&gt; command.&lt;/P&gt;

&lt;P&gt;I have created a role and only added the capabilities &lt;CODE&gt;change_own_password&lt;/CODE&gt;, &lt;CODE&gt;rtsearch&lt;/CODE&gt;, and &lt;CODE&gt;search&lt;/CODE&gt;, while also restricting search access to two (empty) indexes. However, using the this query:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| rest services/data/indexes&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;users will still be able to see all indexes (on the standalone server). Is there a way to prevent this?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Feb 2019 19:56:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402371#M172946</guid>
      <dc:creator>JacobPN</dc:creator>
      <dc:date>2019-02-19T19:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402372#M172947</link>
      <description>&lt;P&gt;You can finde a documentation about capabilities here. there are even some capabilities for the rest api e.g. &lt;CODE&gt;dispatch_rest_to_indexers&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Authorizeconf?utm_source=answers&amp;amp;utm_medium=in-answer&amp;amp;utm_term=authorize.conf&amp;amp;utm_campaign=refdoc" target="test_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Authorizeconf?utm_source=answers&amp;amp;utm_medium=in-answer&amp;amp;utm_term=authorize.conf&amp;amp;utm_campaign=refdoc&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 20 Feb 2019 12:51:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402372#M172947</guid>
      <dc:creator>jbrocks</dc:creator>
      <dc:date>2019-02-20T12:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402373#M172948</link>
      <description>&lt;P&gt;Thank you for your answer. I found the &lt;CODE&gt;dispatch_rest_to_indexers&lt;/CODE&gt; capability. However the current Splunk setup is a standalone server. So not assigning this capability doesn't help in this case (in fact, I didn't assign it and the mentioned &lt;CODE&gt;rest&lt;/CODE&gt; query can still be used). I think I need to disable the &lt;CODE&gt;rest&lt;/CODE&gt; command all together somehow. Do you know if that's possible?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 12:56:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402373#M172948</guid>
      <dc:creator>JacobPN</dc:creator>
      <dc:date>2019-02-20T12:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402374#M172949</link>
      <description>&lt;P&gt;I think you can use the  &lt;CODE&gt;restmap.conf&lt;/CODE&gt; to disable the restapi e.g. with &lt;CODE&gt;acceptFrom&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;acceptFrom=&amp;lt;network_acl&amp;gt; ...
* Lists a set of networks or addresses to allow this endpoint to be accessed
  from.
* This shouldn't be confused with the setting of the same name in the
  [httpServer] stanza of server.conf which controls whether a host can
  make HTTP requests at all
* Each rule can be in the following forms:
    1. A single IPv4 or IPv6 address (examples: "10.1.2.3", "fe80::4a3")
    2. A CIDR block of addresses (examples: "10/8", "fe80:1234/32")
    3. A DNS name, possibly with a '*' used as a wildcard (examples:
       "myhost.example.com", "*.splunk.com")
    4. A single '*' which matches anything
* Entries can also be prefixed with '!' to cause the rule to reject the
  connection.  Rules are applied in order, and the first one to match is
  used.  For example, "!10.1/16, *" will allow connections from everywhere
  except the 10.1.*.* network.
* Defaults to "*" (accept from anywhere)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Find the docu here: &lt;CODE&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Admin/Restmapconf" target="test_blank"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/Admin/Restmapconf&lt;/A&gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 14:28:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402374#M172949</guid>
      <dc:creator>jbrocks</dc:creator>
      <dc:date>2019-02-20T14:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402375#M172950</link>
      <description>&lt;P&gt;Thanks for the reply! I have tried this, but I'm not sure what to edit exactly. Could you provide an example that would disable the particular rest command I mentioned? &lt;BR /&gt;
Also, I'm not sure that whitelisting an ip-address would work? Wouldn't the rest command from the search bar use localhost? Haven't been able to try this, since I'm not sure what to edit in de &lt;CODE&gt;restmap.conf&lt;/CODE&gt; file.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 10:42:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/402375#M172950</guid>
      <dc:creator>JacobPN</dc:creator>
      <dc:date>2019-03-05T10:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/551130#M172951</link>
      <description>&lt;P&gt;Still have this issue?&lt;/P&gt;&lt;P&gt;I’ve found a solution for that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 May 2021 19:02:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/551130#M172951</guid>
      <dc:creator>Bar_Ronen</dc:creator>
      <dc:date>2021-05-10T19:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/750453#M242339</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/229260"&gt;@Bar_Ronen&lt;/a&gt;&amp;nbsp;I would be interested.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 13:43:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/750453#M242339</guid>
      <dc:creator>SierraX369</dc:creator>
      <dc:date>2025-07-25T13:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict search command usage (rest in particular)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/750483#M242349</link>
      <description>&lt;P&gt;This is a relatively old thread and I don't recall seeing any of its participants active lately.&lt;/P&gt;&lt;P&gt;Anyway, I don't think you can disable the rest command as such. You can limit the scope of information the user can access (see the list_* capabilities) but I don't think you can prohibit a user from listing indexes on an AIO instalation.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 22:15:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Restrict-search-command-usage-rest-in-particular/m-p/750483#M242349</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-07-25T22:15:23Z</dc:date>
    </item>
  </channel>
</rss>

