Turning off Splunk platform role-based field filtering
Preview features are provided by Splunk to you "as is" without any warranties, maintenance and support, or service level commitments. Splunk makes this preview feature available in its sole discretion and may discontinue it at any time. Use of preview features is subject to the Splunk General Terms.
At some point you might want to turn off all of your organization's role-based field filters at one time. When you turn off role-based field filtering, any existing role-based field filters you've set remain in place, but Splunk software ignores configuration information, such as field filters on roles, as well as limits on target hosts, sources, and source types. In addition, when your turn off role-based field filtering, personal identifiable information (PII) and protected health information (PHI) data might be visible in searches.
You can turn role-based field filtering back on whenever you want to use field filtering across your organization again.
Because turning off role-based field filters can expose sensitive data to unauthorized users, make sure that it is safe to turn field filtering off. To further secure your system, only allow certain authorized users to turn off role-based field filtering.
- Splunk Cloud Platform
- To turn off role-based field filtering in your environment, request help from Splunk Support. If you have a support contract, file a new case using the Splunk Support Portal at Support and Services. Otherwise, contact Splunk Customer Support.
- Splunk Enterprise
- To turn off role-based field filtering in your environment, follow these steps.
- Prerequisites
- Have the permissions to edit configuration files. Only users with file system access, such as system administrators, can edit configuration files.
- Know how to edit configuration files. Review the steps in How to edit a configuration file in the Splunk Enterprise Admin Manual.
- Decide which directory to store configuration file changes in. There can be configuration files with the same name in your default, local, and app directories. See Where you can place (or find) your modified configuration files in the Splunk Enterprise Admin Manual.
Never change or copy the configuration files in the default directory. The files in the default directory must remain intact and in their original location. Make changes to the files in the local directory.
- Steps
- Open or create a local limits.conf file at $SPLUNK_HOME/etc/system/local.
- In the
[search]
stanza, add the linerole_based_field_filtering=false
.
To turn role-based field filtering back on, change role_based_field_filtering
to true
.
See also
Limiting role-based field filters to specific hosts, sources, indexes, and source types | Password best practices for administrators |
This documentation applies to the following versions of Splunk Cloud Platform™: 9.0.2303, 8.2.2201, 8.2.2202, 8.2.2203, 9.0.2205, 9.0.2208, 9.0.2209
Feedback submitted, thanks!