Splunk® Enterprise Security

Administer Splunk Enterprise Security

The documentation for Splunk Enterprise Security versions 8.0 and higher have been rearchitected from previous versions, causing some links to have redirect errors. For documentation on version 8.0, see Splunk Enterprise Security documentation homepage.
This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

Troubleshoot messages about unnecessary read or write access to investigation KV store collections

Troubleshoot Splunk Web messages about roles that have unnecessary read or write access to the investigation KV store collections.

You might see the following error messages in Splunk Web:

Health Check: Review roles for unnecessary read or write access to the investigation_attachment collection and remove access if possible
Health Check: Review roles for unnecessary read or write access to the investigation_event collection and remove access if possible
Health Check: Review roles for unnecessary read or write access to the investigative_canvas_entries collection and remove access if possible
Health Check: Review roles for unnecessary read or write access to the files collection and remove access if possible
Health Check: Review roles for unnecessary read or write access to the investigation collection and remove access if possible
Health Check: Review roles for unnecessary read or write access to the investigative_canvas collection and remove access if possible

These messages are produced by the Audit - Investigation Collection ACLs saved search. The search looks for non-admin permissions to the investigation KV store collections.

Remove the unnecessary read or write access from the collections

If you see these messages, remove the corresponding [collections/<stanza_name>] collections from $SPLUNK_HOME/etc/apps/SplunkEnterpriseSecuritySuite/metadata/local.meta. Access to these collections by non-admin roles is not recommended. After making the changes, refresh the file cache from Splunk Web: http://<yoursplunkserver>:8000/en-us/debug/refresh?.

In a search head cluster environment, make these changes to the local.meta file on each member in the cluster, via the deployer if applicable. Then refresh the file cache from Splunk Web for each search head: http://<yoursplunkserver>:8000/en-us/debug/refresh?. Alternately, if there are more than a few members in the cluster, a rolling restart can be used instead of the debug/refresh command.

Last modified on 19 January, 2022
Troubleshoot messages about default indexes searched by the admin role   Troubleshoot failed intelligence downloads in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 7.0.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters