Hi,
I am testing the Security Essentials App 3.8.0 in Splunk 9.0.8, and I found the same issue while trying to activate the following contents:
In all cases above, I get two errors:
Do you have any idea how to fix those two errors?
Many thanks
Installing add-ons is not enough to populate a datamodel. You must have indexed data that matches what the datamodel looks for and is tagged appropriately.
None of the listed SE content uses a macro called `summariesonly_config`. Creating one is likely to be the easiest way around this error. I would set the definition to 'summariesonly=true'.
Hi @richgalloway ,
you were right.
The datamodel "Endpoint" was not properly configured, whitelisted indexers were empty.
I added the index wineventlog but it still appears in red. But whenever I click on the "open search" link next to the red icon, that query does get data.
any idea of what might be happening here?
Also, I created the macro "summaryonly_config" as you suggested but new errors appeared related to the other two missing macros "oldsummaries_config" and "fillnull_config".
I also created these macros with a true value in both cases. that seems to solve the issue with the search, no more errors are shown.
thanks
Is the Endpoint DM accelerated? If not, then setting indexes won't accomplish anything. Also, the data in the wineventlog index must be CIM-compliant. See the CIM Manual for the field names expected by the DM. Use field aliases and EVALs in props.conf to create the fields.
hi again @richgalloway ,
the model is accelerated and contains data.
and I use the latest version of the Microsoft add-on 8.9.0 which is CIM compliant.
any other idea?
many thanks