Security

ES notable index empty resulting empty notable dashboards

eegiievol
Explorer

We are unable to see our notable events when correlation search criteria met. Upon investigation, found out that notable index is empty, which resulting es_notable_events  kvstore lookup empty. Correlation search has no issue because we could see other AR actions triggered except notable. 

Our environment:
2 indexers with cluster configuration, 1 SH, 1 stack of MC/License master/Deployment server, 1 Cluster Master. ES version: 6.2.0, Enterprise version: 8.0.5

Hope someone can give me a hand 🙂

0 Karma
1 Solution

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

View solution in original post

0 Karma

eegiievol
Explorer

I found a reason. inputs.conf file was removed while installing CIM app to follow addon installation in distributed environment guide. Some addons are exceptional, I should have read manual carefully.   

0 Karma

thambisetty
SplunkTrust
SplunkTrust

still are you facing an issue. your kv-store might not be running.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...