During various migrations we faced some issues linked to transformations linked to integrations. Indeed, after the systems began running on Elasticsearch 9, some errors like the following arose within NetEye:
These problems looked like they were linked to missing permissions for a specific user, but after some investigation we found out that the user in question was directly managed by Elastic. So, updating/fixing these permissions should be managed by the ELK stack.
So, following the broken Transformation, i.e. logs-elasticsearch.index_pivot-default, we found that the Health status was not OK, and then also that the installed integration was in “Warning”.
The integration had a Warning message like the one in this picture, and under Transform you can find a “Reauthorize all” button that managed all required permissions for the internal user.
Clicking on it will fix the broken transformation, and data will be correctly transformed by Elasticsearch. The status will be Healthy again and also the NetEye Check will be in an “OK” Status again:
So, if you’re upgrading your NetEye to the latest version with ELK Stack 9, remember to have a look at your Transformation, and if you see problems like these, follow this short tutorial in order to fix them.
These Solutions are Engineered by Humans
Did you find this article interesting? Does it match your skill set? Our customers often present us with problems that need customized solutions. In fact, we’re currently hiring for roles just like this and others here at Würth IT Italy.
Fixing Misplaced Plugin Output in Icinga Web Interface When plugin output contained HTML content (like links), it was incorrectly displayed near the service name instead of in the Plugin Output section. The plugin output section now correctly renders all content. Read More
Icinga Director Now Responsive During Configuration Deployments Previously, users were unable to interact with Icinga Director while configuration deployments were running. Any attempt to access the interface or API would be blocked until the deployment completed, causing unnecessary delays in Read More
Important: Grafana security update Type/Severity NetEye Product Security has rated this update as having a high security impact. Topic An update for the Grafana packages is now available for NetEye 4. Security Fix for NetEye 4.46 12.0.9_neteye3.29.1-1 CVEs CVE-2026-21720CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H The CVE is about Read More
Important: GLPI security update Type/Severity NetEye Product Security has rated this update as having a high security impact. Topic An update for the GLPI packages is now available for NetEye 4. Security Fix for NetEye 4.46 10.0.23_neteye1.17.5-1 CVEs CVE-2026-22044CVSS:Reserved CVE-2026-23624CVSS:Reserved The CVEs include Read More
Bug Fix We updated the version of GLPI in order to fix some relevant vulnerabilities. List of updated packages The following packages have been updated for NetEye 4.45: glpi, glpi-autosetup, glpi-configurator, glpi-neteye-config to version 10.0.22_neteye1.17.5-1.