
can_delete – Allows user to delete by keyword.user – Assign this for typical splunk user who can run searches, edit own saved searches, etc.You can edit shared objects, alerts, tag events, etc. Verify that the role is changed for the user. The following will reassign ramesh to Power role. Initially, when we created ramesh, we assigned Admin role. Use splunk edit user command with -role option as shown below to assign an existing user to a different role. In handler 'users': Could not get info for non-existent user="jason1" If the given user doesn’t exist, you’ll get the following non-existent error message. Use splunk remove user command as shown below to delete the given user from splunk native authentication. # splunk add user jason -role Power -password jasonpassword -full-name "Jason Bourne" Let us quickly add an user and then delete it. # splunk edit user ramesh -full-name "Ramesh N"Īfter editing, make sure the changes are reflected using splunk list user. In the following command, we are changing the full-name of the given user. Use splunk edit user command as shown below to edit the details of an existing user. Use splunk list user command as shown below to get a list of all available users in your system. # splunk add user jason -role ReadOnly -password jasonpassword -full-name "Jason Bourne"Įrror creating user. If the given role doesn’t exist, you’ll get an error as shown below.
#Default splunk login full
#Default splunk login password
-password – Specify the password for this new user.In this example, we are assigning ramesh to Admin role -role – This option indicates the role the user will be assigned to.Give the name of the username following this. add user – This indicates that we are adding a new user.splunk – This is the splunk cli command.# splunk add user ramesh -role Admin -password rameshpassword -full-name "Ramesh Natarajan" Use splunk add user command as shown below to add a new user.
#Default splunk login how to
This tutorial explains how to create and manage Splunk users and roles. Capabilities defines the actions that are available to roles Or, you can create a new role and assign to an existing user. You can create a new user and assign to an existing role.So, both “johndoe” and “JohnDoe” are the same user.


This is called role-based access control system. Typically, you’ll create an user, and then assign the user to a role. So, if an user exists in both Splunk native authentication and LDAP, Splunk will use the user in the native authentication. Splunk supports three types of authentication: Native Authentication, LDAP and Scripted Authentication API.įor most part, Native Authentication is referred as Splunk authentication, which takes high priority over any external authentication.
