Security

How can I restrict user access to write to an index?

mkolkebeck
Path Finder

Use of the collect command, or enabling summary indexing for a report, this feature allows a user/role to write to any index that can be searched.

Are there any options to restrict a role's access to index such that it is read-only, or alternatively is it possible to remove the collect command and summary indexing features from a role's capabilities?

1 Solution

micahkemp
Champion

It appears that there is no way for a user to have read-only access to an index while also allowing said search head to write to the same index. You could potentially work around this if you had one search head for users to perform searches (with read-only for that index enabled) and another search head to perform summary indexing (with read/write allowed to the index).

Reference: https://answers.splunk.com/answers/390225/how-to-prevent-users-from-writing-to-indexes.html

View solution in original post

0 Karma

micahkemp
Champion

It appears that there is no way for a user to have read-only access to an index while also allowing said search head to write to the same index. You could potentially work around this if you had one search head for users to perform searches (with read-only for that index enabled) and another search head to perform summary indexing (with read/write allowed to the index).

Reference: https://answers.splunk.com/answers/390225/how-to-prevent-users-from-writing-to-indexes.html

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...