Splunk® Enterprise

Admin Manual

Download manual as PDF

Splunk version 4.x reached its End of Life on October 1, 2013. Please see the migration information.
This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Download topic as PDF

What you can secure with Splunk

Splunk includes several options for securing your data. Authentication options allow you to secure your Splunk Server. Audit configurations enable data security, including cryptographic signing and event hashing.

Authentication

Authentication includes SSL and HTTPS, user-based access controls (known as roles) and LDAP.

SSL

You can configure SSL for three main types of communication:

Each type of SSL communication has its own set-up requirements. Follow the links in the list above to learn more about using SSL in these scenarios.

Configure roles

You no longer have to use Splunk's default roles of Admin, Power or User. While these roles remain built into Splunk, you can now define your own roles out of a list of capabilities. Create flexible roles for Splunk users either in Manager or by editing authorize.conf.

Learn more about configuring roles (in the "Add and manage users" section of this manual).

LDAP

Splunk supports authentication via its internal authentication services or your existing LDAP server.

Learn more about configuring LDAP (in the "Add and manage users" section of this manual).

Scripted authentication

Use scripted authentication to tie Splunk's authentication into an external authentication system, such as RADIUS or PAM.

Learn more about scripted authentication (in the "Add and manage users" section of this manual).

Audit

Splunk includes audit features to allow you to track the reliability of your data. Watch files and directories with the file system change monitor, monitor activities within Splunk (such as searches or configuration changes) with audit events, cryptographically sign audit events events with audit event signing, and block sign any data entering your Splunk index with IT data signing.

File system change monitor

You can use the file system change monitor in Splunk Preview to watch any directory or file. Splunk indexes an event any time the file system undergoes any sort of change or someone edits the watched files. The file system change monitor's behavior is completely configurable through inputs.conf.

Learn more about how to configure the file system change monitor.

Audit events

Watch your Splunk instance by monitoring audit events. Audit events are generated whenever anyone accesses any of your Splunk instances -- including any searches, configuration changes or administrative activities. Each audit event contains information that shows you what changed where and when and who implemented the change. Audit events are especially useful in distributed Splunk configurations for detecting configuration and access control changes across many Splunk Servers.

Learn more about how audit events work.

Audit event signing

If you are using Splunk with an Enterprise license, you can configure audit events to be cryptographically signed. Audit event signing adds a sequential number (for detecting gaps in data to reveal tampering), and appends an encrypted hash signature to each audit event.

Configure auditing by setting stanzas in audit.conf, and inputs.conf.

Learn more about audit event signing.

IT data signing

If you are using Splunk with an Enterprise license, you can configure Splunk to verify the integrity of IT data as it is indexed. If IT data signing is enabled, Splunk creates a signature for blocks of data as it is indexed. Signatures allow you to detect gaps in data or tampered data.

Learn more about IT data signing.

PREVIOUS
Restore archived indexed data
  NEXT
Use SSL (HTTPS) for secure access to Splunk Web

This documentation applies to the following versions of Splunk® Enterprise: 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters