<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154702#M43497</link>
    <description>&lt;P&gt;This is a tricky one, the authorize.conf is where the roles are defined, so what we do is create an application called &lt;BR /&gt;
auth_dev&lt;/P&gt;

&lt;P&gt;and we include in the default  folder two files:&lt;BR /&gt;
authorize.conf&lt;BR /&gt;
authentication.conf&lt;/P&gt;

&lt;P&gt;in &lt;STRONG&gt;authorize.conf&lt;/STRONG&gt; we define the role:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[role_somethingnew]
srchIndexesAllowed = mynewindex
srchIndexesDefault = mynewindex
srchMaxTime = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in &lt;STRONG&gt;authentication.conf&lt;/STRONG&gt; we define the map for ldap group:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[roleMap_MYCOMPANY-LDAP-DEV]
somethingnew = SOME_AD_GROUP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then we push this app from the deployer.&lt;/P&gt;

&lt;P&gt;The thing you need to consider is local authentication.conf on each SH should contain the LDAP strategy definition, and because the password is hashed we cant update this file form the deployer, but once we set it up the first time, we dont need to modify it anymore:&lt;/P&gt;

&lt;P&gt;so in your etc/system/local/authentication.conf for all your search heads you will have something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[authentication]
authSettings = MYCOMPANY-LDAP-DEV
authType = LDAP

[MYCOMPANY-LDAP-DEV]
SSLEnabled = 1
anonymous_referrals = 1
bindDN = cn=somuser,ou=people,dc=mycompanydomain,dc=com
bindDNpassword = ****$1$H#shedPasword=****
charset = utf8
groupBaseDN = ou=groups,dc=mycompanydomain,dc=com
groupBaseFilter = (cn=SOME_AD*)
groupMappingAttribute = dn
groupMemberAttribute = member
groupNameAttribute = cn
host = ldap.mycompany.com
nestedGroups = 1
network_timeout = 20
port = 636
realNameAttribute = displayname
sizelimit = 1000
timelimit = 15
userBaseDN = ou=people,dc=mycompany,dc=com
userNameAttribute = cn
emailAttribute = mail
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;bindDN password will be different on each SH.&lt;BR /&gt;
next time you need to add another role just modify the auth_dev app and that is it&lt;/P&gt;</description>
    <pubDate>Wed, 22 Apr 2015 21:43:43 GMT</pubDate>
    <dc:creator>aalanisr26</dc:creator>
    <dc:date>2015-04-22T21:43:43Z</dc:date>
    <item>
      <title>Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154700#M43495</link>
      <description>&lt;P&gt;How do we add users or groups to roles in a Splunk search head cluster or create new roles?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2015 21:16:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154700#M43495</guid>
      <dc:creator>sat94541</dc:creator>
      <dc:date>2015-04-22T21:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154701#M43496</link>
      <description>&lt;P&gt;Roles  are managed by authorization.conf.&lt;BR /&gt;
authorization.conf  is  not replicated automatically between Search Head Cluster Member.  So the new roles will need to be deployed from deployer.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2015 21:20:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154701#M43496</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2015-04-22T21:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154702#M43497</link>
      <description>&lt;P&gt;This is a tricky one, the authorize.conf is where the roles are defined, so what we do is create an application called &lt;BR /&gt;
auth_dev&lt;/P&gt;

&lt;P&gt;and we include in the default  folder two files:&lt;BR /&gt;
authorize.conf&lt;BR /&gt;
authentication.conf&lt;/P&gt;

&lt;P&gt;in &lt;STRONG&gt;authorize.conf&lt;/STRONG&gt; we define the role:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[role_somethingnew]
srchIndexesAllowed = mynewindex
srchIndexesDefault = mynewindex
srchMaxTime = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in &lt;STRONG&gt;authentication.conf&lt;/STRONG&gt; we define the map for ldap group:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[roleMap_MYCOMPANY-LDAP-DEV]
somethingnew = SOME_AD_GROUP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then we push this app from the deployer.&lt;/P&gt;

&lt;P&gt;The thing you need to consider is local authentication.conf on each SH should contain the LDAP strategy definition, and because the password is hashed we cant update this file form the deployer, but once we set it up the first time, we dont need to modify it anymore:&lt;/P&gt;

&lt;P&gt;so in your etc/system/local/authentication.conf for all your search heads you will have something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[authentication]
authSettings = MYCOMPANY-LDAP-DEV
authType = LDAP

[MYCOMPANY-LDAP-DEV]
SSLEnabled = 1
anonymous_referrals = 1
bindDN = cn=somuser,ou=people,dc=mycompanydomain,dc=com
bindDNpassword = ****$1$H#shedPasword=****
charset = utf8
groupBaseDN = ou=groups,dc=mycompanydomain,dc=com
groupBaseFilter = (cn=SOME_AD*)
groupMappingAttribute = dn
groupMemberAttribute = member
groupNameAttribute = cn
host = ldap.mycompany.com
nestedGroups = 1
network_timeout = 20
port = 636
realNameAttribute = displayname
sizelimit = 1000
timelimit = 15
userBaseDN = ou=people,dc=mycompany,dc=com
userNameAttribute = cn
emailAttribute = mail
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;bindDN password will be different on each SH.&lt;BR /&gt;
next time you need to add another role just modify the auth_dev app and that is it&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2015 21:43:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154702#M43497</guid>
      <dc:creator>aalanisr26</dc:creator>
      <dc:date>2015-04-22T21:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154703#M43498</link>
      <description>&lt;P&gt;As recommended in  Splunk Documentation &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.3/DistSearch/AdduserstotheSHC" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.3/DistSearch/AdduserstotheSHC&lt;/A&gt;, to add users to the search head cluster, use either LDAP or Splunk Enterprise built-in authentication.&lt;BR /&gt;
If you use LDAP, recommendation will be to use Separate test instance, ensure that the authentication functions properly and going forwarder user this instance to test and deploy the Role related configuration.&lt;BR /&gt;
Here I have used deployer to test my LDAP related testing and also use it to deploy changes to Search Head cluster Member.&lt;/P&gt;

&lt;P&gt;Before you follow the below steps, you need to ensure that  local authentication.conf on each SH should contain the LDAP strategy definition and are able to bind to LDAP, and because the password is hashed we can’t update this file form the deployer, but once we set it up the first time, you don't need to modify it anymore. &lt;/P&gt;

&lt;P&gt;Following steps can be utilized to deploy new "roles", "role and index mapping" and "Splunk Role=LDAP Group mapping”.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Step 1&lt;/STRONG&gt;: On search head deployer (SHCdeployer03) login to GUI and create new role and assign it to the LDAP group.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Step 2:&lt;/STRONG&gt; On search head deployer (SHCdeployer03), move the authorize.conf and authentication.conf file from /opt/splunk/etc/system/local to /opt/splunk/etc/shcluster/apps/key_all_authentication/local&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Step 3&lt;/STRONG&gt;: On search head deployer (SHCdeployer03) cd /opt/splunk/etc/shcluster/apps/key_all_authentication/local&lt;/P&gt;

&lt;P&gt;And vi authentication.conf file and remove the following line&lt;/P&gt;

&lt;P&gt;bindDNpassword = &lt;/P&gt;

&lt;P&gt;Make sure you only remove bindDNpassword line from this file and nothing else.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Step 4&lt;/STRONG&gt;: On search head deployer (SHCdeployer03), run the following command:&lt;/P&gt;

&lt;P&gt;splunk apply shcluster-bundle -target Captain URI&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Step 5:&lt;/STRONG&gt; On any search head member  run the following command to check the status of the search member.&lt;/P&gt;

&lt;P&gt;splunk show shcluster-status&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Steps 6&lt;/STRONG&gt;: Login to Any search Head to check the New role.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:50:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154703#M43498</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2020-09-28T19:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154704#M43499</link>
      <description>&lt;P&gt;Documentation Bug      "SPL-100129:How are roles manged in Search head Cluster?" has been added to include this in documentation.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 16:36:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154704#M43499</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2015-05-07T16:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: Search Head Cluster: How to manage new roles between Search Head Cluster Members?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154705#M43500</link>
      <description>&lt;P&gt;this is true for 6.0 6.1 6.2 6.3 but may be sync in future versions, check the release notes.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 22:20:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Head-Cluster-How-to-manage-new-roles-between-Search-Head/m-p/154705#M43500</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2016-02-09T22:20:13Z</dc:date>
    </item>
  </channel>
</rss>

