Splunk Enterprise Security

Error saving event-based detection. Missing detection_id for the detection=

BJ17
Explorer

Unable to update and save detections after upgrading to Splunk ES version 8.1.0. It says Detection ID is missing. 

BJ17_0-1751972052861.png

BJ17_2-1751972216889.png

 

Labels (2)
0 Karma

PrewinThomas
Motivator

@BJ17 

Could you try recreating one of your existing detections in the new ES App(8.1) and check if you’re able to update and save it successfully?

Regards,
Prewin
Splunk Enthusiast | Always happy to help! If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!

0 Karma

BJ17
Explorer

We can recreate the rules without errors. But I'm looking for a way without changing the rule name.

0 Karma

PrewinThomas
Motivator

@BJ17 

Currently, I don't think there is any built-in option to migrate older detections to the new versioning format(in ES 8.1) without encountering these errors..

As a workaround, can you manually add a UUID-style string as the detection_id for your existing detections in savedsearches.conf and test if this resolves the issue

Eg:
[detection_name]
detection_id = d6f2b006-0041-11ec-8885-acde48001122


Regards,
Prewin
Splunk Enthusiast | Always happy to help! If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!

0 Karma

BJ17
Explorer

Thanks @PrewinThomas ,
Splunk ES is hosted in the cloud. So, we cannot update the savedsearches.conf as you have mentioned. 

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...