Managing access to Splunk
Most modern computer systems have mechanisms to control who has access to the systems (authentication) and what functions they are authorized to perform. For example, most users can access a website online but only the site administrators and/or developers are able to access the backend systems that drive the website, such as databases. In addition, most systems are designed to support multiple users at one time. Likewise, administrators in Splunk can control who has access to Splunk and what features they are able to use once they have logged on to the system. We will explore the concept of access control in Splunk in this section. We will discuss the concept of Splunk roles that can be assigned to users to assign permissions and capabilities. A user’s permissions defines their level of access to Splunk. Each knowledge object in Splunk has two possible permissions:
- read – The user can view the knowledge object
- write – The...