Splunk Enterprise Security

After upgrading Splunk Enterprise Security from 3.1 to 4.1.1, why did I get so many "correlation to fail" errors?

rajksplunk
New Member

Network - Unusual Volume of Network Activity - Rule"
"Network - Substantial Increase in an Event - Rule"

0 Karma
1 Solution

smoir_splunk
Splunk Employee
Splunk Employee

@rajksplunk -- Each of those correlation searches use extreme search. If the correlation searches themselves are enabled but the context generation searches are not, the correlation search will fail. See http://docs.splunk.com/Documentation/ES/4.1.1/User/ExtremeSearch for more on how extreme search works. Did these searches work (and were they enabled) before you upgraded?

View solution in original post

smoir_splunk
Splunk Employee
Splunk Employee

@rajksplunk -- Each of those correlation searches use extreme search. If the correlation searches themselves are enabled but the context generation searches are not, the correlation search will fail. See http://docs.splunk.com/Documentation/ES/4.1.1/User/ExtremeSearch for more on how extreme search works. Did these searches work (and were they enabled) before you upgraded?

Get Updates on the Splunk Community!

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...