web.conf
The following are the spec and example files for web.conf
.
web.conf.spec
Version 7.1.9 This file contains possible attributes and values you can use to configure Splunk's web interface. There is a web.conf in $SPLUNK_HOME/etc/system/default/. To set custom configurations, place a web.conf in $SPLUNK_HOME/etc/system/local/. For examples, see web.conf.example. You must restart Splunk to enable configurations. To learn more about configuration files (including precedence) please see the documentation located at http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles [settings] * Set general SplunkWeb configuration options under this stanza name. * Follow this stanza name with any number of the following attribute/value pairs. * If you do not specify an entry for each attribute, Splunk will use the default value. startwebserver = [0 | 1] * Set whether or not to start SplunkWeb. * 0 disables SplunkWeb, 1 enables it. * Defaults to 1. httpport = <port_number> * Must be present for SplunkWeb to start. * If omitted or 0 the server will NOT start an http listener. * If using SSL, set to the HTTPS port number. * Defaults to 8000. mgmtHostPort = <IP:port> * Location of splunkd. * Don't include http[s]:// -- just the IP address. * Defaults to 127.0.0.1:8089. appServerPorts = <one or more port numbers> * Port number(s) for the python-based application server to listen on. This port is bound only on the loopback interface -- it is not exposed to the network at large. * If set to "0", this will prevent the application server from being run from splunkd. Instead, splunkweb will be started as a separate python-based service which directly listens to the 'httpport'. This is how Splunk 6.1.X and earlier behaved. * Generally, you should only set one port number here. For most deployments a single application server won't be a performance bottleneck. However you can provide a comma-separated list of port numbers here and splunkd will start a load-balanced application server on each one. * It is recommended that this be set to a non-zero value. Setting this to "0" should only be done if you experience a compatibility problem. The new separate application server configuration is faster and supports more configuration options. Also, setting this to "0" may cause problems with new functionality, such as using the Search Head Clustering feature. (see the [shclustering] stanza in server.conf) * Defaults to 8065. splunkdConnectionTimeout = <integer> * Number of seconds to wait before timing out when communicating with splunkd * Must be at least 30 * Values smaller than 30 will be ignored, resulting in the use of the default value * Defaults to 30 enableSplunkWebClientNetloc = [True | False] * Control if the splunk web client can override the client network location * Defaults to False. enableSplunkWebSSL = [True | False] * Toggle between http or https. * Set to true to enable https and SSL. * Defaults to False. privKeyPath = <path> * The path to the file containing the web server's SSL certificate's private key. * A relative path is interpreted relative to $SPLUNK_HOME and may not refer outside of $SPLUNK_HOME (e.g., no ../somewhere). * An absolute path can also be specified to an external key. * See also 'enableSplunkWebSSL' and 'serverCert'. serverCert = <path> * Full path to the PEM format Splunk web server certificate file. * The file may also contain root and intermediate certificates, if required. They should be listed sequentially in the order: [ Server's SSL certificate ] [ One or more intermediate certificates, if required ] [ Root certificate, if required ] * Default is $SPLUNK_HOME/etc/auth/splunkweb/cert.pem. * See also 'enableSplunkWebSSL' and 'privKeyPath'. sslPassword = <password> * Password protecting the private key specified by 'privKeyPath'. * Optional. Defaults to unencrypted private key. * If encrypted private key is used, do not enable client-authentication on splunkd server. In [sslConfig] stanza of server.conf, 'requireClientCert' must be 'false'. caCertPath = <path> * DEPRECATED; use 'serverCert' instead. * A relative path is interpreted relative to $SPLUNK_HOME and may not refer outside of $SPLUNK_HOME (e.g., no ../somewhere). requireClientCert = [True | False] * Requires that any HTTPS client that connects to the splunkweb HTTPS server has a certificate that was signed by the CA cert installed on this server. * If true, a client can connect ONLY if a certificate created by our certificate authority was used on that client. * When true, it is mandatory to configure splunkd with same root CA in server.conf. This is needed for internal communication between splunkd and splunkweb. * Defaults to false. sslCommonNameToCheck = <commonName1>, <commonName2>, ... * Optional. Defaults to no common name checking. * Check the common name of the client's certificate against this list of names. * requireClientCert must be set to true for this setting to work. sslAltNameToCheck = <alternateName1>, <alternateName2>, ... * If this value is set, and 'requireClientCert' is set to true, splunkweb will verify certificates which have a so-called "Subject Alternate Name" that matches any of the alternate names in this list. * Subject Alternate Names are effectively extended descriptive fields in SSL certs beyond the commonName. A common practice for HTTPS certs is to use these values to store additional valid hostnames or domains where the cert should be considered valid. * Accepts a comma-separated list of Subject Alternate Names to consider valid. * Optional. Defaults to no alternate name checking serviceFormPostURL = http://docs.splunk.com/Documentation/Splunk * This attribute is deprecated since 5.0.3 userRegistrationURL = https://www.splunk.com/page/sign_up updateCheckerBaseURL = http://quickdraw.Splunk.com/js/ docsCheckerBaseURL = http://quickdraw.splunk.com/help * These are various Splunk.com urls that are configurable. * Setting updateCheckerBaseURL to 0 will stop the SplunkWeb from pinging Splunk.com for new versions of itself. enable_insecure_login = [True | False] * Indicates if the GET-based /account/insecurelogin endpoint is enabled * Provides an alternate GET-based authentication mechanism * If True, the following url is available: http://localhost:8000/en-US/account/insecurelogin?loginType=splunk&username=noc&password=XXXXXXX * If False, only the main /account/login endpoint is available * Defaults to False simple_error_page = [True | False] * If set to True a simplified error page will be displayed for errors (404, 500, etc.) only containing the status * If set to False a more verbose error page will be displayed containing homelink, message, more_results_link, crashes, referrer, debug output and byline * Defaults to False login_content = <content_string> * Add custom content to the login page * Supports any text including html sslVersions = <list of ssl versions string> * Comma-separated list of SSL versions to support * The versions available are "ssl3", "tls1.0", "tls1.1", and "tls1.2" * The special version "*" selects all supported versions. The version "tls" selects all versions tls1.0 or newer * If a version is prefixed with "-" it is removed from the list * SSLv2 is always disabled; "-ssl2" is accepted in the version list but does nothing * When appServerPorts=0 only supported values are "all", "ssl3, tls" and "tls" * When configured in FIPS mode ssl3 is always disabled regardless of this configuration * For default look in $SPLUNK_HOME/etc/system/default/web.conf. * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value supportSSLV3Only = <bool> * When appServerPorts is set to a non-zero value (the default mode), this setting is DEPRECATED. SSLv2 is now always disabled. The exact set of SSL versions allowed is now configurable via the "sslVersions" setting above. * When appServerPorts is set to zero, this controls whether we disallow SSLv2 connections. cipherSuite = <cipher suite string> * If set, uses the specified cipher string for the HTTP server. * If not set, uses the default cipher string provided by OpenSSL. This is used to ensure that the server does not accept connections using weak encryption protocols. * Must specify 'dhFile' to enable any Diffie-Hellman ciphers. * The default can vary. See the cipherSuite setting in * $SPLUNK_HOME/etc/system/default/web.conf for the current default. ecdhCurves = <comma separated list of ec curves> * ECDH curves to use for ECDH key negotiation. * The curves should be specified in the order of preference. * The client sends these curves as a part of Client Hello. * The server supports only the curves specified in the list. * We only support named curves specified by their SHORT names. (see struct ASN1_OBJECT in asn1.h) * The list of valid named curves by their short/long names can be obtained by executing this command: $SPLUNK_HOME/bin/splunk cmd openssl ecparam -list_curves * e.g. ecdhCurves = prime256v1,secp384r1,secp521r1 * The default can vary. See the ecdhCurves setting in * $SPLUNK_HOME/etc/system/default/web.conf for the current default. ecdhCurveName = <string> * DEPRECATED; use 'ecdhCurves' instead. * ECDH curve to use for ECDH key negotiation * We only support named curves specified by their SHORT name. (see struct ASN1_OBJECT in asn1.h) * The list of valid named curves by their short/long names can be obtained by executing this command: $SPLUNK_HOME/bin/splunk cmd openssl ecparam -list_curves * Default is empty string. dhFile = <path> * The path to the Diffie-Hellman parameter file. * Relative paths are interpreted as relative to $SPLUNK_HOME. * Relative paths may not refer outside of $SPLUNK_HOME (eg. no ../somewhere). * An absolute path can also be specified to an external key. * Not set by default. root_endpoint = <URI_prefix_string> * Defines the root URI path on which the appserver will listen * Default setting is '/' * Ex: if you want to proxy the splunk UI at http://splunk:8000/splunkui, then set root_endpoint = /splunkui static_endpoint = <URI_prefix_string> * Path to static content * The path here is automatically appended to root_endpoint defined above * Default is /static static_dir = <relative_filesystem_path> * The directory that actually holds the static content * This can be an absolute url if you want to put it elsewhere * Default is share/splunk/search_mrsparkle/exposed rss_endpoint = <URI_prefix_string> * Path to static rss content * The path here is automatically appended to root_endpoint defined above * Default is /rss embed_uri = <URI> * Optional URI scheme/host/port prefix for embedded content * This presents an optional strategy for exposing embedded shared content that does not require authentication in reverse proxy/SSO environment. * Default is empty and will resolve to the client window.location.protocol + "//" + window.location.host embed_footer = <html_string> * chunk of html to define the footer for an embedded report. * Defaults to "splunk>" but can be changed to whatever the user would like. tools.staticdir.generate_indexes = [1 | 0] * Indicates if the webserver will serve a directory listing for static directories * Defaults to 0 (false) template_dir = <relative_filesystem_path> * Base path to mako templates * Defaults to share/splunk/search_mrsparkle/templates module_dir = <relative_filesystem_path> * Base path to UI module assets * Defaults to share/splunk/search_mrsparkle/modules enable_gzip = [True | False] * Determines if webserver applies gzip compression to responses * Defaults to True use_future_expires = [True | False] * Determines if the Expires header of /static files is set to a far-future date * Defaults to True flash_major_version = <integer> flash_minor_version = <integer> flash_revision_version = <integer> * Specifies the minimum Flash plugin version requirements * Flash support, broken into three parts. * We currently require a min baseline of Shockwave Flash 9.0 r124 override_JSON_MIME_type_with_text_plain = [True | False] * Specifies whether or not to override the MIME type for JSON data served up by splunkweb endpoints with content-type="text/plain; charset=UTF-8" * If True, splunkweb endpoints (other than proxy) that serve JSON data will serve as "text/plain; charset=UTF-8" * If False, splunkweb endpoints that serve JSON data will serve as "application/json; charset=UTF-8" enable_proxy_write = [True | False] * Indicates if the /splunkd proxy endpoint allows POST operations * If True, both GET and POST operations are proxied through to splunkd * If False, only GET operations are proxied through to splunkd * Setting this to False will prevent many client-side packages (such as the Splunk JavaScript SDK) from working correctly * Defaults to True js_logger_mode = [None | Firebug | Server] * JavaScript Logger mode * Available modes: None, Firebug, Server * Mode None: Does not log anything * Mode Firebug: Use firebug by default if it exists or defer to the older less promiscuous version of firebug lite * Mode Server: Log to a defined server endpoint * See js/logger.js Splunk.Logger.Mode for mode implementation details and if you would like to author your own * Defaults to None js_logger_mode_server_end_point = <URI_relative_path> * Specifies the server endpoint to post javascript log messages * Used when js_logger_mode = Server * Defaults to util/log/js js_logger_mode_server_poll_buffer = <integer> * Specifieds the interval in milliseconds to check, post and cleanse the javascript log buffer * Defaults to 1000 js_logger_mode_server_max_buffer = <integer> * Specifies the maximum size threshold to post and cleanse the javascript log buffer * Defaults to 100 ui_inactivity_timeout = <integer> * Specifies the length of time lapsed (in minutes) for notification when there is no user interface clicking, mouseover, scrolling or resizing. * Notifies client side pollers to stop, resulting in sessions expiring at the tools.sessions.timeout value. * If less than 1, results in no timeout notification ever being triggered (Sessions will stay alive for as long as the browser is open). * Defaults to 60 minutes js_no_cache = [True | False] * DEPRECATED * Toggle js cache control * Defaults to False cacheBytesLimit = <integer> * When appServerPorts is set to a non-zero value, splunkd can keep a small cache of static assets in memory. When the total size of the objects in cache grows larger than this, we begin the process of ageing entries out. * Defaults to 4194304 (i.e. 4 Megabytes) * If set to zero, this cache is completely disabled cacheEntriesLimit = <integer> * When appServerPorts is set to a non-zero value, splunkd can keep a small cache of static assets in memory. When the number of the objects in cache grows larger than this, we begin the process of ageing entries out. * Defaults to 16384 * If set to zero, this cache is completely disabled staticCompressionLevel = <integer> * When appServerPorts is set to a non-zero value, splunkd can keep a small cache of static assets in memory. These are stored compressed and can usually be served directly to the web browser in compressed format. * This level can be a number between 1 and 9. Lower numbers use less CPU time to compress objects, but the resulting compressed objects will be larger. * Defaults to 9. Usually not much CPU time is spent compressing these objects so there is not much benefit to decreasing this. enable_autocomplete_login = [True | False] * Indicates if the main login page allows browsers to autocomplete the username * If True, browsers may display an autocomplete drop down in the username field * If False, browsers are instructed not to show autocomplete drop down in the username field * Defaults to False verifyCookiesWorkDuringLogin = [True | False] * Normally, the login page will make an attempt to see if cookies work properly in the user's browser before allowing them to log in. If this is set to False, this check is skipped. * Defaults to True. It is recommended that this be left on. * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value minify_js = [True | False] * Indicates whether the static JS files for modules are consolidated and minified * Enabling improves client-side performance by reducing the number of HTTP requests and the size of HTTP responses minify_css = [True | False] * Indicates whether the static CSS files for modules are consolidated and minified * Enabling improves client-side performance by reducing the number of HTTP requests and the size of HTTP responses * Due to browser limitations, disabling this when using IE9 and earlier may result in display problems. trap_module_exceptions = [True | False] * Toggle whether the JS for individual modules is wrapped in a try/catch * If True, syntax errors in individual modules will not cause the UI to hang, other than when using the module in question * Set this to False when developing apps. enable_pivot_adhoc_acceleration = [True | False] * Toggle whether the pivot interface will use its own ad-hoc acceleration when a data model is not accelerated. * If True, this ad-hoc acceleration will be used to make reporting in pivot faster and more responsive. * In situations where data is not stored in time order or where the majority of events are far in the past, disabling this behavior can improve the pivot experience. * DEPRECATED in version 6.1 and later, use pivot_adhoc_acceleration_mode instead pivot_adhoc_acceleration_mode = [Elastic | AllTime | None] * Specify the type of ad-hoc acceleration used by the pivot interface when a data model is not accelerated. * If Elastic, the pivot interface will only accelerate the time range specified for reporting, and will dynamically adjust when this time range is changed. * If AllTime, the pivot interface will accelerate the relevant data over all time. This will make the interface more responsive to time-range changes but places a larger load on system resources. * If None, the pivot interface will not use any acceleration. This means any change to the report will require restarting the search. * Defaults to Elastic jschart_test_mode = [True | False] * Toggle whether JSChart module runs in Test Mode * If True, JSChart module attaches HTML classes to chart elements for introspection * This will negatively impact performance, so should be disabled unless actively in use. To avoid browser performance impacts, the JSChart library limits the amount of data rendered in an individual chart. jschart_truncation_limit = <int> * Cross-broswer truncation limit, if defined takes precedence over the browser-specific limits below jschart_truncation_limit.chrome = <int> * Chart truncation limit for Chrome only * Defaults to 50000 jschart_truncation_limit.firefox = <int> * Chart truncation limit for Firefox only * Defaults to 50000 jschart_truncation_limit.safari = <int> * Chart truncation limit for Safari only * Defaults to 50000 jschart_truncation_limit.ie11 = <int> * Chart truncation limit for Internet Explorer 11 only * Defaults to 50000 jschart_series_limit = <int> * Chart series limit for all browsers. * Defaults to 100 jschart_results_limit = <int> * Chart results per series limit for all browsers. * DEPRECATED: Use data_sources.primary.params.count in visualizations.conf * to override the results per series limit for individual visualizations. * Defaults to 10000 choropleth_shape_limit = <int> * Choropleth map shape limit for all browsers. * Defaults to 10000 dashboard_html_allow_inline_styles = <bool> * If this setting is set to false styles attributes from inline HTML elements * in dashboards will be removed to prevent potential attacks. * Default is true dashboard_html_allow_iframes = <bool> * If this setting is set to false, iframes from HTML elements * in dashboards will be removed to prevent potential attacks. * Default is true max_view_cache_size = <integer> * Specifies the maximum number of views to cache in the appserver. * Defaults to 300. pdfgen_is_available = [0 | 1] * Specifies whether Integrated PDF Generation is available on this search head * This is used to bypass an extra call to splunkd * Defaults to 1 on platforms where node is supported, defaults to 0 otherwise version_label_format = <printf_string> * Internal config * Used to override the version reported by the UI to *.splunk.com resources * Defaults to: %s auto_refresh_views = [0 | 1] * Specifies whether the following actions cause the appserver to ask splunkd to reload views from disk. * Logging in via the UI * Switching apps * Clicking the Splunk logo * Defaults to 0. Splunk bar options Internal config. May change without notice. Only takes effect if instanceType is 'cloud'. showProductMenu = [True | False] * Used to indicate visibility of product menu. * Defaults to False. productMenuUriPrefix = <string> * The domain product menu links to. * Required if showProductMenu is set to True. productMenuLabel = <string> * Used to change the text label for product menu. * Defaults to 'My Splunk'. showUserMenuProfile = [True | False] * Used to indicate visibility of 'Profile' link within user menu. * Defaults to False. Header options x_frame_options_sameorigin = [True | False] * adds a X-Frame-Options header set to "SAMEORIGIN" to every response served * by cherrypy * Defaults to True
SSO
remoteUser = <http_header_string> * Remote user HTTP header sent by the authenticating proxy server. * This header should be set to the authenticated user. * Defaults to 'REMOTE_USER'. * Caution: There is a potential security concern regarding Splunk's treatment of HTTP headers. * Your proxy provides the selected username as an HTTP header as specified above. * If the browser or other http agent were to specify the value of this header, probably any proxy would overwrite it, or in the case that the username cannot be determined, refuse to pass along the request or set it blank. * However, Splunk (cherrypy) will normalize headers containing the dash, and the underscore to the same value. For example USER-NAME and USER_NAME will be treated as the same in SplunkWeb. * This means that if the browser provides REMOTE-USER and splunk accepts REMOTE_USER, theoretically the browser could dictate the username. * In practice, however, in all our testing, the proxy adds its headers last, which causes them to take precedence, making the problem moot. * See also the 'remoteUserMatchExact' setting which can enforce more exact header matching when running with appServerPorts enabled. remoteGroups = <http_header_string> * Remote groups HTTP header name sent by the authenticating proxy server. * This value is used by splunk the match against header name. * The header value format should be set to comma separated groups that user belongs to. * Example of header value: Products,Engineering,Quality Assurance * There is no default value set for this parameter. remoteGroupsQuoted = [true | false] * This attribute is considered only when 'remoteGroups' is set. * When value is set to true, the group header value can be comma separated * quoted entries. Note: These entries can contain comma. * Example of header value with quoted entries: * "Products","North America, Engineering","Quality Assurance" * By default value is set to false, in which case group entries should be without quotes. remoteUserMatchExact = [0 | 1] * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * When matching the remoteUser header with value "1", consider dashes and underscores distinct (so "Remote-User" and "Remote_User" will be considered different headers) * Value "0" is for compatibility with older versions of Splunk, but setting to "1" is a good idea when setting up SSO with appServerPorts enabled * Defaults to "0" remoteGroupsMatchExact = [0 | 1] * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * When matching the remoteGroups header with value "1", consider dashes and underscores distinct (so "Remote-Groups" and "Remote_Groups" will be considered different headers) * Value "0" is for compatibility with older versions of Splunk, but setting to "1" is a good idea when setting up SSO with appServerPorts enabled * Defaults to "0" SSOMode = [permissive | strict] * Allows SSO to behave in either permissive or strict mode. * Permissive: Requests to Splunk Web that originate from an untrusted IP address are redirected to a login page where they can log into Splunk without using SSO. * Strict: All requests to splunkweb will be restricted to those originating from a trusted IP except those to endpoints not requiring authentication. * Defaults to "strict" trustedIP = <ip_address> * Trusted IP. This is the IP address of the authenticating proxy. * Splunkweb verifies it is receiving data from the proxy host for all SSO requests. * Uncomment and set to a valid IP address to enable SSO. * Disabled by default. Normal value is '127.0.0.1' * If appServerPorts is set to a non-zero value, this setting can accept a richer set of configurations, using the same format as the "acceptFrom" setting. allowSsoWithoutChangingServerConf = [0 | 1] * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * Usually when configuring SSO, a trustedIP needs to be set both here in web.conf and also in server.conf. If this is set to "1" then we will enable web-based SSO without a trustedIP in server.conf * Defaults to 0 testing_endpoint = <relative_uri_path> * Specifies the root URI path on which to serve splunkweb unit and integration testing resources. * Development only setting * Defaults to '/testing' testing_dir = <relative_file_path> * Specifies the path relative to $SPLUNK_HOME that contains the testing files to be served at endpoint defined by 'testing_endpoint'. * Development only setting * Defaults to 'share/splunk/testing' ssoAuthFailureRedirect = <scheme>://<URL> * Used to set the redirect URL if SSO authentication fails. Examples: http://www.example.com https://www.example.com * Defaults to an empty value and will show the default unauthorized error page if SSO authentication fails. Results export server config export_timeout = <integer> * When exporting results, the number of seconds the server waits before * closing the connection with splunkd. If you do not set a value for * export_timeout, the value in splunkdConnectionTimeout is used. * We recommend that you set export_timeout to a value greater than 30 cherrypy HTTP server config server.thread_pool = <integer> * Specifies the minimum number of threads the appserver is allowed to maintain * Defaults to 20 server.thread_pool_max = <integer> * Specifies the maximum number of threads the appserver is allowed to maintain * Defaults to -1 (unlimited) server.thread_pool_min_spare = <integer> * Specifies the minimum number of spare threads the appserver keeps idle * Defaults to 5 server.thread_pool_max_spare = <integer> * Specifies the maximum number of spare threads the appserver keeps idle * Defaults to 10 server.socket_host = <ip_address> * Host values may be any IPv4 or IPv6 address, or any valid hostname. * The string 'localhost' is a synonym for '127.0.0.1' (or '::1', if your hosts file prefers IPv6). The string '0.0.0.0' is a special IPv4 entry meaning "any active interface" (INADDR_ANY), and '::' is the similar IN6ADDR_ANY for IPv6. * Defaults to 0.0.0.0 if listenOnIPv6 is set to no, else :: server.socket_timeout = <integer> * The timeout in seconds for accepted connections between the browser and splunkweb * Defaults to 10 listenOnIPv6 = <no | yes | only> * By default, splunkweb will listen for incoming connections using IPv4 only * To enable IPv6 support in splunkweb, set this to "yes". Splunkweb will simultaneously listen for connections on both IPv4 and IPv6 * To disable IPv4 entirely, set this to "only", which will cause splunkweb * to exclusively accept connections over IPv6. * You will also want to set server.socket_host (use "::" instead of "0.0.0.0") if you wish to listen on an IPv6 address max_upload_size = <integer> * Specifies the hard maximum size of uploaded files in MB * Defaults to 500 log.access_file = <filename> * Specifies the HTTP access log filename * Stored in default Splunk /var/log directory * Defaults to web_access.log log.access_maxsize = <integer> * Specifies the maximum size the web_access.log file should be allowed to grow to (in bytes) * Comment out or set to 0 for unlimited file size * File will be rotated to web_access.log.0 after max file size is reached * See log.access_maxfiles to limit the number of backup files created * Defaults to unlimited file size log.access_maxfiles = <integer> * Specifies the maximum number of backup files to keep after the web_access.log file has reached its maximum size * Warning: setting this to very high numbers (eg. 10000) may impact performance during log rotations * Defaults to 5 if access_maxsize is set log.error_maxsize = <integer> * Specifies the maximum size the web_service.log file should be allowed to grow to (in bytes) * Comment out or set to 0 for unlimited file size * File will be rotated to web_service.log.0 after max file size is reached * See log.error_maxfiles to limit the number of backup files created * Defaults to unlimited file size log.error_maxfiles = <integer> * Specifies the maximum number of backup files to keep after the web_service.log file has reached its maximum size * Warning: setting this to very high numbers (eg. 10000) may impact performance during log rotations * Defaults to 5 if access_maxsize is set log.screen = [True | False] * Indicates if runtime output is displayed inside an interactive tty * Defaults to True request.show_tracebacks = [True | False] * Indicates if a an exception traceback is displayed to the user on fatal exceptions * Defaults to True engine.autoreload_on = [True | False] * Indicates if the appserver will auto-restart if it detects a python file has changed * Defaults to False tools.sessions.on = True * Indicates if user session support is enabled * Should always be True tools.sessions.timeout = <integer> * Specifies the number of minutes of inactivity before a user session is expired * The countdown is effectively reset by browser activity minute until ui_inactivity_timeout inactivity timeout is reached. * Use a value of 2 or higher, as a value of 1 will race with the browser refresh, producing unpredictable behavior. (Low values aren't very useful though except for testing.) * Defaults to 60 tools.sessions.restart_persist = [True | False] * If set to False then the session cookie will be deleted from the browser when the browser quits * Defaults to True - Sessions persist across browser restarts (assuming the tools.sessions.timeout limit hasn't been reached) tools.sessions.httponly = [True | False] * If set to True then the session cookie will be made unavailable to running javascript scripts, increasing session security * Defaults to True tools.sessions.secure = [True | False] * If set to True and Splunkweb is configured to server requests using HTTPS (see the enableSplunkWebSSL setting) then the browser will only transmit the session cookie over HTTPS connections, increasing session security * Defaults to True tools.sessions.forceSecure = [True | False] * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value * If the client connects with HTTPS to a proxy server and the back end connects to Splunk via HTTP, set this attribute to "True" so that session cookie sent over HTTPS to the client has the secure bit set * Defaults to False response.timeout = <integer> * Specifies the number of seconds to wait for the server to complete a response * Some requests such as uploading large files can take a long time * Defaults to 7200 tools.sessions.storage_type = [file] tools.sessions.storage_path = <filepath> * Specifies the session information storage mechanisms * Comment out the next two lines to use RAM based sessions instead * Use an absolute path to store sessions outside of the splunk tree * Defaults to storage_type=file, storage_path=var/run/splunk tools.decode.on = [True | False] * Indicates if all strings that come into Cherrpy controller methods are decoded as unicode (assumes UTF-8 encoding). * WARNING: Disabling this will likely break the application, as all incoming strings are assumed to be unicode. * Defaults to True tools.encode.on = [True | False] * Encodes all controller method response strings into UTF-8 str objects in Python. * WARNING: Disabling this will likely cause high byte character encoding to fail. * Defaults to True tools.encode.encoding = <codec> * Force all outgoing characters to be encoded into UTF-8. * This only works with tools.encode.on set to True. * By setting this to utf-8, Cherrypy's default behavior of observing the * Accept-Charset header is overwritten and forces utf-8 output. Only change this if you know a particular browser installation must receive some other character encoding (Latin-1 iso-8859-1, etc) * WARNING: Change this at your own risk. * Defaults to utf-8 tools.proxy.on = <boolean> * Whether or not the Splunk platform instance is behind a reverse proxy server. * If set to "true", the instance assumes that it is behind a reverse proxy and uses HTTP header information from the proxy to log access requests, secure its cookies properly, and generate valid URLs for redirect responses. * All of the instance's HTTP services will use information from "X-Forwarded-*", "Front-End-Https", and "X-Url-Scheme" headers, where available, to override what it receives from proxied requests. * If you set this to "true", you must also set 'tools.proxy.base' to a valid host name and network port. * If set to "false", the instance relies on its own internal HTTP server settings and the immediate client's HTTP headers for the information needed for access request logging, cookie securing, and redirect URL generation. * Default: false tools.proxy.base = <scheme>://<URL> * Used for setting the proxy base url in Splunk * Defaults to an empty value pid_path = <filepath> * Specifies the path to the PID file * Equals precisely and only var/run/splunk/splunkweb.pid * NOTE: Do not change this parameter. enabled_decomposers = <intention> [, <intention>]... * Added in Splunk 4.2 as a short term workaround measure for apps which happen to still require search decomposition, which is deprecated with 4.2. * Search decomposition will be entirely removed in a future release. * Comma separated list of allowed intentions. * Modifies search decomposition, which is a splunk-web internal behavior. * Can be controlled on a per-app basis. * If set to the empty string, no search decomposition occurs, which causes some usability problems with report builder. * The current possible values are: addcommand, stats, addterm, addtermgt, addtermlt, setfields, excludefields, audit, sort, plot * Default is 'plot', leaving only the plot intention enabled. * When you need a good mulch, we recommend antibeethoven. * However, for a traditional compost, antimozart is preferred. simple_xml_perf_debug = [True | False] * If True, simple xml dashboards will log some performance metrics to the browser console * Defaults to False job_min_polling_interval = <integer> * Minimum polling interval for job in miliseconds (ms) * The default value is 100 * This is the intial time wait for fetching results * The poll period increases gradually from min interval to max interval when search is in queued state or parsing state (and not running state) for a some time. * Set this value between 100 to job_max_polling_interval job_max_polling_interval = <integer> * Maximum polling interval for job in miliseconds (ms) * The default value is 1000 * This is the maximum time wait for fetching results * The recommended maximum value is 3000 acceptFrom = <network_acl> ... * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * Lists a set of networks or addresses to accept connections from. These rules are separated by commas or spaces * Each rule can be in the following forms: 1. A single IPv4 or IPv6 address (examples: "10.1.2.3", "fe80::4a3") 2. A CIDR block of addresses (examples: "10/8", "fe80:1234/32") 3. A DNS name, possibly with a '*' used as a wildcard (examples: "myhost.example.com", "*.splunk.com") 4. A single '*' which matches anything * Entries can also be prefixed with '!' to cause the rule to reject the connection. Rules are applied in order, and the first one to match is used. For example, "!10.1/16, *" will allow connections from everywhere except the 10.1.*.* network. * Defaults to "*" (accept from anywhere) maxThreads = <int> * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value * Number of threads that can be used by active HTTP transactions. This can be limited to constrain resource usage. * If set to 0 (the default) a limit will be automatically picked based on estimated server capacity. * If set to a negative number, no limit will be enforced. maxSockets = <int> * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value * Number of simultaneous HTTP connections that we accept simultaneously. This can be limited to constrain resource usage. * If set to 0 (the default) a limit will be automatically picked based on estimated server capacity. * If set to a negative number, no limit will be enforced. keepAliveIdleTimeout = <int> * How long, in seconds, that the SplunkWeb HTTP server allows a keep-alive connection to remain idle before forcibly disconnecting it. * If this number is less than 7200, it will be set to 7200. * Defaults to 7200 seconds. busyKeepAliveIdleTimeout = <int> * How long, in seconds, that the SplunkWeb HTTP server allows a keep-alive connection to remain idle while in a busy state before forcibly disconnecting it. * Use caution when configuring this setting as a value that is too large can result in file descriptor exhaustion due to idling connections. * If this number is less than 12, it will be set to 12. * Defaults to 12 seconds. forceHttp10 = auto|never|always * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value * When set to "always", the REST HTTP server will not use some HTTP 1.1 features such as persistent connections or chunked transfer encoding. * When set to "auto" it will do this only if the client sent no User-Agent header, or if the user agent is known to have bugs in its HTTP/1.1 support. * When set to "never" it always will allow HTTP 1.1, even to clients it suspects may be buggy. * Defaults to "auto" crossOriginSharingPolicy = <origin_acl> ... * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * List of HTTP Origins for which to return Access-Control-Allow-* (CORS) headers * These headers tell browsers that we trust web applications at those sites to make requests to the REST interface * The origin is passed as a URL without a path component (for example "https://app.example.com:8000") * This setting can take a list of acceptable origins, separated by spaces and/or commas * Each origin can also contain wildcards for any part. Examples: *://app.example.com:* (either HTTP or HTTPS on any port) https://*.example.com (any host under example.com, including example.com itself) * An address can be prefixed with a '!' to negate the match, with the first matching origin taking precedence. For example, "!*://evil.example.com:* *://*.example.com:*" to not avoid matching one host in a domain * A single "*" can also be used to match all origins * By default the list is empty allowSslCompression = true|false * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value. When appServerPorts is zero or missing, this setting will always act as if it is set to "true" * If set to true, the server will allow clients to negotiate SSL-layer data compression. * Defaults to false. The HTTP layer has its own compression layer which is usually sufficient. allowSslRenegotiation = true|false * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * In the SSL protocol, a client may request renegotiation of the connection settings from time to time. * Setting this to false causes the server to reject all renegotiation attempts, breaking the connection. This limits the amount of CPU a single TCP connection can use, but it can cause connectivity problems especially for long-lived connections. * Defaults to true sendStrictTransportSecurityHeader = true|false * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value * If set to true, the REST interface will send a "Strict-Transport-Security" header with all responses to requests made over SSL. * This can help avoid a client being tricked later by a Man-In-The-Middle attack to accept a non-SSL request. However, this requires a commitment that no non-SSL web hosts will ever be run on this hostname on any port. For example, if splunkweb is in default non-SSL mode this can break the ability of browser to connect to it. Enable with caution. * Defaults to false dedicatedIoThreads = <int> * If set to zero, HTTP I/O will be performed in the same thread that accepted the TCP connection. * If set set to a non-zero value, separate threads will be run to handle the HTTP I/O, including SSL encryption. * Defaults to "0" * Typically this does not need to be changed. For most usage scenarios using the same the thread offers the best performance. * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value replyHeader.<name> = <string> * Add a static header to all HTTP responses this server generates * For example, "replyHeader.My-Header = value" will cause the response header "My-Header: value" to be included in the reply to every HTTP request to the UI HTTP server * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value termsOfServiceDirectory = <directory> * If set, we will look in this directory for a "Terms Of Service" document which each user must accept before logging into the UI * Inside the directory the TOS should have a filename in the format "<number>.html" Where <number> is in the range 1 to 18446744073709551615. The active TOS is the filename with the larger number. For instance if there are two files in the directory named "123.html" and "456.html", then 456 will be the active TOS version. * If a user hasn't accepted the current version of the TOS, they'll be required to the next time they try to log in. The acceptance times will be recorded inside a "tos.conf" file inside an app called "tos" * If the "tos" app does not exist, it must be created for acceptance times to be recorded. * The TOS file can either be a full HTML document or plain text, but it must have the ".html" suffix * It is not necessary to restart Splunk when adding files to the TOS directory * Defaults to empty (no TOS) * NOTE: this setting only takes effect when appServerPorts is set to a non-zero value appServerProcessShutdownTimeout = <nonnegative integer>[smhd] * IMPORTANT: this setting only takes effect when appServerPorts is set to a non-zero value. * The amount of time splunkd will wait "politely" for a Python-based application server process to handle outstanding/existing requests. * If a Python-based application server process "outlives" this timeout, the process is forcibly killed. * Defaults to '10m' enableWebDebug = true|false * Controls the visibility of the debug endpoints (i.e., /debug/**splat). * Defaults to false allowableTemplatePaths = <directory> [, <directory>]... * A comma separated list of template paths that may be added tp template lookup white list. * Paths are relative to $SPLUNK_HOME. * Defaults to empty enable_risky_command_check = <bool> * Enable checks for data-exfiltrating search commands. * default true customFavicon = <pathToMyFile, myApp:pathToMyFile, or blank for default> * Customize the favicon image across the entire application. If no favicon image file, the favicon defaults to the Splunk favicon. * Supported favicon image files are .ico files, and should be square images. * Place favicon image file in default or manual location: * Default destination folder: $SPLUNK_HOME/etc/apps/search/appserver/static/customfavicon. * Example: If your favicon image is located at $SPLUNK_HOME/etc/apps/search/appserver/static/customfavicon/favicon.ico, type customFavicon = customfavicon/favicon.ico. * Manual location: $SPLUNK_HOME/etc/apps/<myApp>/appserver/static/<pathToMyFile>, and type customFavicon = <myApp:pathToMyFile>. loginCustomLogo = <fullUrl, pathToMyFile, myApp:pathToMyFile, or blank for default> * Customize the logo image on the login page. If no image file, the logo defaults to the Splunk logo. * Supported images are: * Full URL image file (secured or not secured), such as https://www.splunk.com/logo.png or http://www.splunk.com/logo.png. * Image file, such as .jpg or .png. All image formats are supported. * Place logo image file in default or manual location: * Default destination folder: $SPLUNK_HOME/etc/apps/search/appserver/static/logincustomlogo. * Example: If your logo image is located at $SPLUNK_HOME/etc/apps/search/appserver/static/logincustomlogo/logo.png, type loginCustomLogo = logincustomlogo/logo.png. * Manual location: $SPLUNK_HOME/etc/apps/<myApp>/appserver/static/<pathToMyFile>, and type loginCustomLogo = <myApp:pathToMyFile>. * The maximum image size is 485px wide and 100px high. If the image exceeds these limits, the image is automatically resized. loginBackgroundImageOption = [default| custom | none] * Controls display of the background image of the login page. * Defaults to "default". * "default" displays the Splunk default background image. * "custom" uses the background image defined by the backgroundImageCustomName setting. * "none" removes any background image on the login page. A dark background color is applied. loginCustomBackgroundImage = <pathToMyFile or myApp:pathToMyFile> * Customize the login page background image. * Supported image files include .jpg, .jpeg or .png with a maximum file size of 20Mb. * Landscape image is recommended, with a minimum resolution of 1024x640 pixels. * Using Splunk Web: * Upload a custom image to a manager page under General Settings. * The login page background image updates automatically. * Using the CLI or a text editor: * Set loginBackgroundImageOption = "custom". * Place custom image file in default or manual location: * Default destination folder: $SPLUNK_HOME/etc/apps/search/appserver/static/logincustombg. * Example: If your image is located at $SPLUNK_HOME/etc/apps/search/appserver/static/logincustombg/img.png, type loginCustomBackgroundImage = logincustombg/img.png. * Manual location: $SPLUNK_HOME/etc/apps/<myApp>/appserver/static/<pathToMyFile>, and type loginCustomBackgroundImage = <myApp:pathToMyFile>. * The login page background image updates automatically. * If no custom image is used, the default Splunk background image displays. loginFooterOption = [default | custom | none] * Controls display of the footer message of the login page. * Defaults to "default". * "default" displays the Splunk copyright text. * "custom" uses the footer text defined by the loginFooterText setting. * "none" removes any footer text on the login page. * NOTE: This option is made available only to OEM customers participating in Splunk's OEM Partner Program * and subject to the relevant terms of the Master OEM Agreement. All other customers or partners are prohibited * from removing or altering any copyright, trademark, and/or other intellectual property or proprietary rights * notices of Splunk placed on or embedded in any Splunk materials. loginFooterText = <footer_text> * Text to display in the footer of the login page. * Supports any text including html. * To display, the parameter loginFooterOption must be set to "custom". loginDocumentTitleOption = [default | custom | none] * Controls display of the document title of the login page. * Defaults to "default". * "default" displays: "<page_title> | Splunk". * "none" removes the branding on the document title of the login page: "<page_title>". * "custom" uses the document title text defined by the loginDocumentTitleText setting. * NOTE: This option is made available only to OEM customers participating in Splunk's OEM Partner Program * and subject to the relevant terms of the Master OEM Agreement. All other customers or partners are prohibited * from removing or altering any copyright, trademark, and/or other intellectual property or proprietary rights * notices of Splunk placed on or embedded in any Splunk materials. loginDocumentTitleText = <document_title_text> * Text to display in the document title of the login page. * Text only. * To display, the parameter loginDocumentTitleOption must be set to "custom". loginPasswordHint = <default_password_hint> * Text to display password hint at first time login on the login page. * Text only. Default is "changeme". appNavReportsLimit = <integer> * Maximum number of reports to fetch to populate the navigation drop-down menu of an app. * An app must be configured to list reports in its navigation XML configuration before it can list any reports. * Set to -1 to display all the available reports in the navigation menu. * NOTE: Setting to either -1 or a value that is higher than the default might result in decreased browser performance due to listing large numbers of available reports in the drop-down menu. * Defaults to 500. [framework] Put App Framework settings here django_enable = [True | False] * Specifies whether Django should be enabled or not * Defaults to True * Django will not start unless an app requires it django_path = <filepath> * Specifies the root path to the new App Framework files, relative to $SPLUNK_HOME * Defaults to etc/apps/framework django_force_enable = [True | False] * Specifies whether to force Django to start, even if no app requires it * Defaults to False custom cherrypy endpoints [endpoint:<python_module_name>] * registers a custom python CherryPy endpoint * The expected file must be located at: $SPLUNK_HOME/etc/apps/<APP_NAME>/appserver/controllers/<PYTHON_NODULE_NAME>.py * This module's methods will be exposed at /custom/<APP_NAME>/<PYTHON_NODULE_NAME>/<METHOD_NAME> exposed splunkd REST endpoints [expose:<unique_name>] * Registers a splunkd-based endpoint that should be made available to the UI under the "/splunkd" and "/splunkd/__raw" hierarchies * The name of the stanza doesn't matter as long as it starts with "expose:" Each stanza name must be unique, however pattern = <url_pattern> * Pattern to match under the splunkd /services hierarchy. For instance, "a/b/c" would match URIs "/services/a/b/c" and "/servicesNS/*/*/a/b/c" * The pattern should not include leading or trailing slashes * Inside the pattern an element of "*" will match a single path element. For example, "a/*/c" would match "a/b/c" but not "a/1/2/c" * A path element of "**" will match any number of elements. For example, "a/**/c" would match both "a/1/c" and "a/1/2/3/c" * A path element can end with a "*" to match a prefix. For example, "a/elem-*/b" would match "a/elem-123/c" methods = <method_lists> * Comma separated list of methods to allow from the web browser (example: "GET,POST,DELETE") * If not included, defaults to "GET" oidEnabled = [0 | 1] * If set to 1 indicates that the endpoint is capable of taking an embed-id as a query parameter * Defaults to 0 * This is only needed for some internal splunk endpoints, you probably should not specify this for app-supplied endpoints skipCSRFProtection = [0 | 1] * If set to 1, tells splunkweb that it is safe to post to this endpoint without applying CSRF protection * Defaults to 0 * This should only be set on the login endpoint (which already contains sufficient auth credentials to avoid CSRF problems)
web.conf.example
# Version 7.1.9 # # This is an example web.conf. Use this file to configure data web # settings. # # To use one or more of these configurations, copy the configuration block # into web.conf in $SPLUNK_HOME/etc/system/local/. You must restart Splunk # to enable configurations. # # To learn more about configuration files (including precedence) please see # the documentation located at # http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles # This stanza heading must precede any changes. [settings] # Change the default port number: httpport = 12800 # Also run the python application server on a non-default port: appServerPorts = 12801 # Turn on SSL: enableSplunkWebSSL = true # absolute paths may be used here. privKeyPath = /home/user/certs/myprivatekey.pem serverCert = /home/user/certs/mycacert.pem # NOTE: non-absolute paths are relative to $SPLUNK_HOME
visualizations.conf | wmi.conf |
This documentation applies to the following versions of Splunk® Enterprise: 7.1.9
Feedback submitted, thanks!