Splunk Enterprise Security

Splunk for Enterprise Security: Is it possible to allow non-admin users to create notable events manually?

adsplunk1
New Member

Good afternoon.

This is related to Enterprise Security 3.1.1 build 219910.

Is it possible to allow a non-admin user to create notable events manually? Currently we are getting a 403 error when they attempt to do so.

Looking at the _internal log I see the following:

"POST /services/receivers/simple?source=Manual%20Notable%20Event%20-%20Rule&index=notable&sourcetype=stash_new&host=server.company.com HTTP/1.0" 403 164 - - - 0ms

Is this because the user doesn't have the indexes_edit capability? Any solutions available that don't involve making the user an admin?

Thank you.

0 Karma
1 Solution

rphillips_splk
Splunk Employee
Splunk Employee

A non-administrator role, such as an ES analyst, needs to have an administrator grant additional permissions to the role, in order to manually create and edit a new notable event.

To add the permissions to the ess_analyst role, an administrator would do the following:

  1. In Splunk Web, choose Settings > Access Controls > Roles.

  2. Click on the ess-analyst role (in the list of roles) to open the editor.

  3. In the "Capabilities" section, add edit_tcp to the Selected capabilities.

  4. Click Save.

http://docs.splunk.com/Documentation/ES/3.2.1/User/Notableeventsandincidentworkflow

View solution in original post

ppablo
Retired

Hi @adsplunk1

Just following up with this post, but did @rphillips_splunk's answer below solve your question? If yes, please don't forget to resolve this post by clicking "Accept" directly below his answer and upvote it by clicking on the up arrow to the left of the answer. Thanks!

0 Karma

rphillips_splk
Splunk Employee
Splunk Employee

A non-administrator role, such as an ES analyst, needs to have an administrator grant additional permissions to the role, in order to manually create and edit a new notable event.

To add the permissions to the ess_analyst role, an administrator would do the following:

  1. In Splunk Web, choose Settings > Access Controls > Roles.

  2. Click on the ess-analyst role (in the list of roles) to open the editor.

  3. In the "Capabilities" section, add edit_tcp to the Selected capabilities.

  4. Click Save.

http://docs.splunk.com/Documentation/ES/3.2.1/User/Notableeventsandincidentworkflow

First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...