Security

ES notable index empty resulting empty notable dashboards

eegiievol
Explorer

We are unable to see our notable events when correlation search criteria met. Upon investigation, found out that notable index is empty, which resulting es_notable_events  kvstore lookup empty. Correlation search has no issue because we could see other AR actions triggered except notable. 

Our environment:
2 indexers with cluster configuration, 1 SH, 1 stack of MC/License master/Deployment server, 1 Cluster Master. ES version: 6.2.0, Enterprise version: 8.0.5

Hope someone can give me a hand 🙂

0 Karma
1 Solution

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

View solution in original post

0 Karma

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

0 Karma

thambisetty
SplunkTrust
SplunkTrust

still are you facing an issue. your kv-store might not be running.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...