You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

454 lines
17 KiB

@placement search-head
# Version 20170103
#
# This file contains possible attribute/value pairs for creating roles in
# authorize.conf. You can configure roles and granular access controls by
# creating your own authorize.conf.
# There is an authorize.conf in $SPLUNK_HOME/etc/system/default/. To set
# custom configurations, place an authorize.conf in
# $SPLUNK_HOME/etc/system/local/. For examples, see authorize.conf.example.
# You must restart Splunk to enable configurations.
#
# To learn more about configuration files (including precedence) please see
# the documentation located at
# http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles
# GLOBAL SETTINGS
# Use the [default] stanza to define any global settings.
# * You can also define global settings outside of any stanza, at the top
# of the file.
# * Each conf file should have at most one default stanza. If there are
# multiple default stanzas, attributes are combined. In the case of
# multiple definitions of the same attribute, the last definition in
# the file wins.
# * If an attribute is defined at both the global level and in a specific
# stanza, the value in the specific stanza takes precedence.
[default]
srchFilterSelecting = <boolean>
* Determine's whether roles' search filters will be used for selecting or
eliminating during role inheritance.
* Selecting will join the search filters with an OR when combining the
filters.
* Eliminating will join the search filters with an AND when combining the
filters.
* All roles will default to true (in other words, selecting).
* Example:
* role1 srchFilter = sourcetype!=ex1 with selecting=true
* role2 srchFilter = sourcetype=ex2 with selecting = false
* role3 srchFilter = sourcetype!=ex3 AND index=main with selecting = true
* role3 inherits from role2 and role 2 inherits from role1
* Resulting srchFilter = ((sourcetype!=ex1) OR (sourcetype!=ex3 AND index=main)) AND ((sourcetype=ex2))
[capability::<capability>]
* DO NOT edit, remove, or add capability stanzas. The existing capabilities
are the full set of Splunk system capabilities.
* Splunk adds all of its capabilities this way
* For the default list of capabilities and assignments, see authorize.conf
under the 'default' directory
* Descriptions of specific capabilities are listed below.
[role_<roleName>]
<capability> = <enabled>
* A capability that is enabled for this role.
* You can list many of these.
* Note that 'enabled' is the only accepted value here, as capabilities are
disabled by default.
* Roles inherit all capabilities from imported roles, and inherited
capabilities cannot be disabled.
* Role names cannot have uppercase characters. User names, however, are
case-insensitive.
importRoles = <string>
* Semicolon delimited list of other roles and their associated capabilities
that should be imported.
* Importing other roles also imports the other aspects of that role, such as
allowed indexes to search.
* By default a role imports no other roles.
grantableRoles = <string>
* Semicolon delimited list of roles that can be granted when edit_user
capability is present.
* By default, a role with edit_user capability can create/edit a user and
assign any role to them. But when grantableRoles is present, the roles
that can be assigned will be restricted to the ones provided.
* For a role that has no edit_user capability, grantableRoles has no effect.
* Defaults to not present.
* Example: grantableRoles = role1;role2;role3
srchFilter = <string>
* Semicolon delimited list of search filters for this Role.
* By default we perform no search filtering.
* To override any search filters from imported roles, set this to '*', as
the 'admin' role does.
srchTimeWin = <number>
* Maximum time span of a search, in seconds.
* This time window limit is applied backwards from the latest time
specified in a search.
* By default, searches are not limited to any specific time window.
* To override any search time windows from imported roles, set this to '0'
(infinite), as the 'admin' role does.
* -1 is a special value that implies no search window has been set for this role
* This is equivalent to not setting srchTimeWin at all, which means it
can be easily overridden by an imported role
srchDiskQuota = <number>
* Maximum amount of disk space (MB) that can be used by search jobs of a
user that belongs to this role
* Defaults to '100', for 100 MB.
srchJobsQuota = <number>
* Maximum number of concurrently running historical searches a member of
this role can have.
* This excludes real-time searches, see rtSrchJobsQuota.
* Defaults to 3.
rtSrchJobsQuota = <number>
* Maximum number of concurrently running real-time searches a member of this
role can have.
* Defaults to 6.
srchMaxTime = <number><unit>
* Maximum amount of time that searches of users from this role will be
allowed to run.
* Once the search has been ran for this amount of time it will be auto
finalized, If the role
* Inherits from other roles, the maximum srchMaxTime value specified in the
included roles.
* This maximum does not apply to real-time searches.
* Examples: 1h, 10m, 2hours, 2h, 2hrs, 100s
* Defaults to 100days
srchIndexesDefault = <string>
* Semicolon delimited list of indexes to search when no index is specified
* These indexes can be wildcarded, with the exception that '*' does not
match internal indexes
* To match internal indexes, start with '_'. All internal indexes are
represented by '_*'
* Defaults to none, but the UI will automatically populate this with 'main'
in manager
srchIndexesAllowed = <string>
* Semicolon delimited list of indexes this role is allowed to search
* Follows the same wildcarding semantics as srchIndexesDefault
* Defaults to none, but the UI will automatically populate this with '*' in
manager
deleteIndexesAllowed = <string>
* Semicolon delimited list of indexes this role is allowed to delete
* This setting must be used in conjunction with the delete_by_keyword
capability
* Follows the same wildcarding semantics as srchIndexesDefault
* Defaults to none
cumulativeSrchJobsQuota = <number>
* Maximum number of concurrently running historical searches in total
across all members of this role
* Requires enable_cumulative_quota = true in limits.conf to take effect.
* If a user belongs to multiple roles, the user's searches count against the role with
the largest cumulative search quota. Once the quota for that role is consumed, the
user's searches count against the role with the next largest quota, and so on.
* In search head clustering environments, this setting takes effect on a per-member basis.
There is no cluster-wide accounting.
cumulativeRTSrchJobsQuota = <number>
* Maximum number of concurrently running real-time searches in total
across all members of this role
* Requires enable_cumulative_quota = true in limits.conf to take effect.
* If a user belongs to multiple roles, the user's searches count against the role with
the largest cumulative search quota. Once the quota for that role is consumed, the
user's searches count against the role with the next largest quota, and so on.
* In search head clustering environments, this setting takes effect on a per-member basis.
There is no cluster-wide accounting.
### Descriptions of Splunk system capabilities
[capability::accelerate_datamodel]
* Required to accelerate a datamodel.
[capability::admin_all_objects]
* A role with this capability has access to objects in the system (user
objects, search jobs, etc.)
* This bypasses any ACL restrictions (similar to root access in a *nix
environment)
* We check this capability when accessing manager pages and objects
[capability::change_authentication]
* Required to change authentication settings through the various
authentication endpoints.
* Also controls whether authentication can be reloaded
[capability::change_own_password]
* Self explanatory. Some auth systems prefer to have passwords be immutable
for some users.
[capability::list_storage_passwords]
* Controls access to the /storage/passwords endpoint. Users with this capability
can perform GETs. Note that the admin_all_objects capability is required to
perform POSTs to the /storage/passwords endpoint.
[capability::delete_by_keyword]
* Required to use the 'delete' search operator. Note that this does not
actually delete the raw data on disk.
* Delete merely masks the data (via the index) from showing up in search
results.
[capability::edit_deployment_client]
* Self explanatory. The deployment client admin endpoint requires this cap
for edit.
[capability::list_deployment_client]
* Self explanatory.
[capability::edit_deployment_server]
* Self explanatory. The deployment server admin endpoint requires this cap
for edit.
* Required to change/create remote inputs that get pushed to the forwarders.
[capability::list_deployment_server]
* Self explanatory.
[capability::edit_dist_peer]
* Required to add and edit peers for distributed search.
[capability::edit_forwarders]
* Required to edit settings for forwarding data.
* Used by TCP and Syslog output admin handlers
* Includes settings for SSL, backoff schemes, etc.
[capability::edit_indexerdiscovery]
* Required to edit settings for indexer discovery.
* Used by Indexer Discovery admin handlers
* Includes settings for master_uri, pass4SymmKey, etc.
[capability::edit_httpauths]
* Required to edit and end user sessions through the httpauth-tokens endpoint
[capability::edit_indexer_cluster]
* Required to edit or manage indexer cluster.
[capability::edit_input_defaults]
* Required to change the default hostname for input data in the server
settings endpoint.
[capability::edit_monitor]
* Required to add inputs and edit settings for monitoring files.
* Used by the standard inputs endpoint as well as the one-shot input
endpoint.
[capability::edit_modinput_winhostmon]
* Required to add and edit inputs for monitoring Windows host data.
[capability::edit_modinput_winnetmon]
* Required to add and edit inputs for monitoring Windows network data.
[capability::edit_modinput_winprintmon]
* Required to add and edit inputs for monitoring Windows printer data.
[capability::edit_modinput_perfmon]
* Required to add and edit inputs for monitoring Windows performance.
[capability::edit_modinput_admon]
* Required to add and edit inputs for monitoring Splunk's Active Directory.
[capability::edit_roles]
* Required to edit roles as well as change the mappings from users to roles.
* Used by both the users and roles endpoint.
[capability::edit_roles_grantable]
* Restrictive version of the edit_roles capability. Only allows creation of
roles with subset of the capabilities that the current user has as part of
its grantable_roles. only works in conjunction with edit_user and grantableRoles
[capability::edit_scripted]
* Required to create and edit scripted inputs.
[capability::edit_search_server]
* Required to edit general distributed search settings like timeouts,
heartbeats, and blacklists
[capability::list_introspection]
* Required to read introspection settings and statistics for indexers, search,
processors, queues, etc.
* Does not permit editing introspection settings.
[capability::list_settings]
* Required to list general server and introspection settings such as the server
name, log levels, etc.
[capability::edit_server]
* Required to edit general server and introspection settings such as the server
name, log levels, etc.
* Inherits ability to read general server and introspection settings.
[capability::edit_search_head_clustering]
* Required to edit and manage search head clustering.
[capability::edit_search_scheduler]
* Required to disable/enable the search scheduler.
[capability::edit_search_schedule_priority]
* Required to give a search a higher-than-normal schedule priority.
[capability::edit_search_schedule_window]
* Required to give a search a non-automatic (or no) schedule window.
[capability::list_search_scheduler]
* Required to display search scheduler settings.
[capability::edit_sourcetypes]
* Required to create and edit sourcetypes.
[capability::edit_splunktcp]
* Required to change settings for receiving TCP input from another Splunk
instance.
[capability::edit_splunktcp_ssl]
* Required to list or edit any SSL specific settings for Splunk TCP input.
[capability::edit_splunktcp_token]
* Required to list or edit splunktcptokens which can be used on a receiving
system to only accept data from forwarders that have been configured with
same token.
[capability::edit_tcp]
* Required to change settings for receiving general TCP inputs.
[capability::edit_udp]
* Required to change settings for UDP inputs.
[capability::edit_telemetry_settings]
* Required to change settings to opt-in and send telemetry data.
[capability::edit_token_http]
* Required to create, edit, display and remove settings for HTTP token input.
[capability::edit_user]
* Required to create, edit, or remove users.
* Note that Splunk users may edit certain aspects of their information
without this capability.
* Also required to manage certificates for distributed search.
[capability::edit_view_html]
* Required to create, edit, or otherwise modify HTML-based views.
[capability::edit_web_settings]
* Required to change the settings for web.conf through the system settings
endpoint.
[capability::get_diag]
* Required to use the /streams/diag endpoint to get remote diag from an
instance
[capability::get_metadata]
* Required to use the 'metadata' search processor.
[capability::get_typeahead]
* Required for typeahead. This includes the typeahead endpoint and the
'typeahead' search processor.
[capability::input_file]
* Required for inputcsv (except for dispatch=t mode) and inputlookup
[capability::indexes_edit]
* Required to change any index settings like file size and memory limits.
[capability::license_tab]
* Required to access and change the license.(Deprecated)
[capability::license_edit]
* Required to access and change the license.
[capability::license_view_warnings]
* Required to view license warnings on the system banner
[capability::list_forwarders]
* Required to show settings for forwarding data.
* Used by TCP and Syslog output admin handlers.
[capability::list_indexerdiscovery]
* Required to show settings for indexer discovery.
* Used by Indexer Discovery handlers.
[capability::list_httpauths]
* Required to list user sessions through the httpauth-tokens endpoint.
[capability::list_indexer_cluster]
* Required to list indexer cluster objects like buckets, peers etc.
[capability::list_inputs]
* Required to view the list of various inputs.
* This includes input from files, TCP, UDP, Scripts, etc.
[capability::list_search_head_clustering]
* Required to list search head clustering objects like artifacts, delegated
jobs, members, captain, etc.
[capability::output_file]
* Required for outputcsv (except for dispatch=t mode) and outputlookup
[capability::request_remote_tok]
* Required to get a remote authentication token.
* Used for distributing search to old 4.0.x Splunk instances.
* Also used for some distributed peer management and bundle replication.
[capability::rest_apps_management]
* Required to edit settings for entries and categories in the python remote
apps handler.
* See restmap.conf for more information
[capability::rest_apps_view]
* Required to list various properties in the python remote apps handler.
* See restmap.conf for more info
[capability::rest_properties_get]
* Required to get information from the services/properties endpoint.
[capability::rest_properties_set]
* Required to edit the services/properties endpoint.
[capability::restart_splunkd]
* Required to restart Splunk through the server control handler.
[capability::rtsearch]
* Required to run a realtime search.
[capability::run_debug_commands]
* Required to run debugging commands like 'summarize'
[capability::schedule_search]
* Required to schedule saved searches.
[capability::schedule_rtsearch]
* Required to schedule real time saved searches. Note that scheduled_search
capability is also required to be enabled
[capability::search]
* Self explanatory - required to run a search.
[capability::use_file_operator]
* Required to use the 'file' search operator.
[capability::accelerate_search]
* Required to save an accelerated search
* All users have this capability by default
[capability::web_debug]
* Required to access /_bump and /debug/** web debug endpoints
[capability::edit_server_crl]
* Required to reload CRL information within Splunk
[capability::search_process_config_refresh]
* Required to use the "refresh search-process-config" CLI command, which
manually flushes idle search processes.
[capability::extra_x509_validation]
* Required to perform additional X509 validation through
the /server/security/extra-x509-validation.
[capability::dispatch_rest_to_indexers]
* Required to dispatch rest search command to indexers