Getting Data In
Provide Splunk Cloud feedback in this confidential UX survey by June 17
for a chance to win a $200 Amazon gift card!

ES notable index empty resulting empty notable dashboards

eegiievol
Explorer

We are unable to see our notable events when correlation search criteria met. Upon investigation, found out that notable index is empty, which resulting es_notable_events  kvstore lookup empty. Correlation search has no issue because we could see other AR actions triggered except notable. 

Our environment:
2 indexers with cluster configuration, 1 SH, 1 stack of MC/License master/Deployment server, 1 Cluster Master. ES version: 6.2.0, Enterprise version: 8.0.5

Hope someone can give me a hand 

eegiievol_0-1600234991221.png

 

Labels (3)
0 Karma
1 Solution

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

View solution in original post

0 Karma

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

View solution in original post

0 Karma

thambisetty
Super Champion

check the status of kvstore on search head. status should be ready.

| rest splunk_server=local  /services/server/info | table kvStoreStatus

 

————————————
If this helps, give a like below.
0 Karma

eegiievol
Explorer

eegiievol_0-1600237327509.png

 

0 Karma
Take the 2021 Splunk Career Survey

Help us learn about how Splunk has
impacted your career by taking the 2021 Splunk Career Survey.

Earn $50 in Amazon cash!