Troubleshoot risk modifiers in Splunk Enterprise Security
Manually fix the default risk modifiers in the savedsearches.conf
configuration file if an automatic migration of the risk modifiers for event based detections fails in Splunk Enterprise Security.
Issue
Default risk modifiers are not automatically added to the event-based detections in Splunk Enterprise Security. If the migration mod input fails to process and remove invalid risk modifiers from searches, the following error message appears in the UI: Failed to migrate the following detections...
.
Cause
Automatic migration of the default risk modifiers failed.
Solution
Follow these steps to add the default risk modifiers in event-based detections:
- In Splunk Enterprise Security, determine which searches have not been updated successfully by running the following search:
| rest /servicesNS/-/-/saved/searches splunk_server=local count=0 | search action.risk.param._risk = "[]" OR action.risk.param._risk = "[{\"risk_object_field\":\"\",\"risk_object_type\":\"\",\"risk_score\":1}]" | table action.correlationsearch.label, action.risk.param._risk
- Navigate to Settings then Data Inputs and then Configuration checker.
- Locate the
confcheck_es_migrate_faulty_riskmodifiers
input. - Enable the mod input. If successful, the input cleans up and disables itself automatically within a minute.
If the input does not disable after about 10 minutes, then manually disable the input.
- Run the following search again to confirm if the searches have been successfully updated:
| rest /servicesNS/-/-/saved/searches splunk_server=local count=0 | search action.risk.param._risk = "[]" OR action.risk.param._risk = "[{\"risk_object_field\":\"\",\"risk_object_type\":\"\",\"risk_score\":1}]" | table action.correlationsearch.label, action.risk.param._risk
If working correctly, the search returns 0 results.
If the search returns more than 0 results, follow these additional steps:
- Identify the searches that still contain invalid entries by running the following search:
| rest /servicesNS/-/-/saved/searches splunk_server=local count=0 | search NOT action.risk.param._risk = "[]" OR action.risk.param._risk = "[{\"risk_object_field\":\"\",\"risk_object_type\":\"\",\"risk_score\":1}]" | table action.correlationsearch.label, action.risk.param._risk, eai:acl.app
- Remove the invalid entries by running the following cURL command for each search obtained from step 1 : For more details, see the saved/searches API in the Splunk Enterprise REST API Reference Manual.
curl -k -v -u {username:password} {instanceURL:splunkdport}/{context}/{app}/saved/searches/{search_name} -d action.risk.param._risk=''
- Verify that there are no invalid searches by rerunning the search from step 1. The search should return 0 results.
Troubleshoot detections with special characters | Troubleshoot performance issues by editing saved searches in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.2
Feedback submitted, thanks!