Splunk® Industrial Asset Intelligence (Legacy)

Install and Upgrade Splunk Industrial Asset Intelligence

Splunk Industrial Asset Intelligence reached its End of Sale on February 24, 2020.

Set up Splunk Industrial Asset Intelligence

Before your users can start to use Splunk Industrial Asset Intelligence (IAI), perform the following setup steps.

Apply your license

If you have not already done so, apply the license file you received when you purchased the product. See Add a license in the Splunk for Industrial IoT documentation.

Verify that the KV Store is running

The Splunk IAI relies on the Splunk KV Store to match your metrics to your assets at search time. On your search heads, make sure that the KV Store process is running and that the KV Store port is open. KV Store uses port 8191 by default.

If you are not sure if your KV Store process is enabled, run ps aux | grep kvstore in the command line.

Set up email settings for alerting

Before IAI administrators can configure the Send email alert action for alerts that they set in Splunk IAI, you must configure your email settings on all of your search heads. See Configure email notification for your Splunk instance.

Install the Twilio SMS Alerting add-on for alerting

Before IAI administrators can configure the Send Twilio SMS Alerts alert action for alerts that they set in Splunk IAI, you must install and configure the Twilio SMS Alerting add-on. This add-on is community supported.

  1. Download the add-on from Splunkbase.
  2. Follow the instructions on the Splunkbase Details page to install and configure the add-on on your search heads.

If you have a search head cluster, deploy the add-on to your cluster members as part of a configuration bundle. See Deploy a configuration bundle in the Splunk Enterprise Distributed Search manual.

Create indexes

Create indexes to store data for use in Splunk IAI. For instructions on how to create indexes, see Create custom indexes in the Splunk Enterprise Managing Indexers and Clusters of Indexers manual.

In a distributed deployment, update the common indexes.conf file deployed across all indexers and heavy forwarders to declare the index names and set the storage and security requirements. Add the indexes.conf file to the search heads to enable type-ahead functionality in searches and to set role access to the indexes for user roles.

Create roles and add users

Use the Splunk Enterprise access control system to manage user access to the Splunk platform and to Splunk IAI.

See:

Last modified on 23 January, 2019
Back up and restore Splunk Industrial Asset Intelligence   Share data in Splunk Industrial Asset Intelligence

This documentation applies to the following versions of Splunk® Industrial Asset Intelligence (Legacy): 1.2.1, 1.2.2, 1.3.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters