Splunk Cloud Platform

How to change permissions from a search in Splunk Cloud?


I am looking to monitor permissions for anything that has the everyone permission that is created by a normal user with the following query:

| rest /servicesNS/-/search/directory
| search author!=nobody AND author!=admin
| fields title, eai:type, author, disabled, eai:acl.perms.read, eai:acl.perms.write
| rename eai:* AS *, acl.* AS *
| where 'perms.write'="*" OR 'perms.read'="*"
| search NOT type IN (views, commands, macros, *lookup*, *extract*, fvtags, fieldaliases, nav, eventtypes)

Which is fine but what I really want to do is then have it change those everyone permissions to our base user (which is the inheritance point for all other groups and all users are put in it).  So I want to make it as a self remediating alert.  

Thing is I can't find anything on changing permissions with the splunk query language and being a cloud instance I don't have access to the cli.

0 Karma
Get Updates on the Splunk Community!

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

Observability Newsletter Highlights | March 2023

 March 2023 | Check out the latest and greatestSplunk APM's New Tag Filter ExperienceSplunk APM has updated ...