Security

User with multiple splunk roles cannot search certain indexes

splunkIT
Splunk Employee
Splunk Employee

AD user is assigned to role SPLNK_DNS which is working fine. User also needs to be part of other role called exchange. Splunk Manager UI shows that user is part of both roles and no erros in AD logs when user logs it. However, when he searches for exhange logs, no events shows even though events are there.

Also noticed that if role SPLUNK_DNS is removed from this user, he is able to search the the exchange datatype with results.

0 Karma

splunkIT
Splunk Employee
Splunk Employee

It turns out that the role SPLNK_DNS is restricted to search terms "index=dns_index".

Once this restriction is removed from Manager » Access controls » Roles » SPLNK_DNS

"Restrict search terms" field, user belonging to to role SPLNK_DNS can now search other indexes.

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...