All Apps and Add-ons

Splunk for Palo Alto Networks: How to limit permissions for users by log type?

ckillg
Path Finder

I would like to limit certain users' access to URL filtering and config change data coming from the PAN. Is there a way to do that?

I would put the data in separate indexes, but the app documentation says to use pan_logs for everything.

0 Karma
1 Solution

jnussbaum_splun
Splunk Employee
Splunk Employee

Under Access Controls -> Roles , you can restrict search terms and exclude eventtypes such as you're mentioning above with:
index=pan_logs eventtype!=pan_config eventtype!=pan_threat
This will allow the Role to search the pan_logs index, but not events that fall into the eventtype of pan_config and pan_threat. Hope that's what you're looking for.

View solution in original post

jnussbaum_splun
Splunk Employee
Splunk Employee

Under Access Controls -> Roles , you can restrict search terms and exclude eventtypes such as you're mentioning above with:
index=pan_logs eventtype!=pan_config eventtype!=pan_threat
This will allow the Role to search the pan_logs index, but not events that fall into the eventtype of pan_config and pan_threat. Hope that's what you're looking for.

ckillg
Path Finder

Perfect. Thanks.

0 Karma
Get Updates on the Splunk Community!

User Groups | Upcoming Events!

If by chance you weren't already aware, the Splunk Community is host to numerous User Groups, organized ...

Splunk Lantern | Spotlight on Security: Adoption Motions, War Stories, and More

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...