Configure multiple ITSI deployments to use the same indexing layer
You can deploy separate non-clustered IT Service Intelligence (ITSI) search heads for different purposes that forward data to the same indexers. For example, you can use one search head for production and a second search head for testing. You can also deploy separate search head clusters that use the same indexer cluster. In each case, the search heads must be running the same version of ITSI and Splunk Enterprise.
Before configuring multiple ITSI environments to search against the same indexing tier, you must first follow these steps to ensure that different ITSI environments don't end up inadvertently writing to the same ITSI indexes and polluting the results of your production environment.
High level steps:
- Create a new index for each ITSI index with the name of the environment appended to the original index name.
- Configure the ITSI search heads to write to the newly created indexes.
- Restart your Splunk software.
- Validate that your new environment is configured to write to the new indexes.
Step 1: Create new indexes
On each Splunk indexer, create a new index for each of the six
anomaly_detection indexes listed in
$SPLUNK_HOME/etc/apps/SA-IndexCreation/default/indexes.conf. Append the name of the environment to the original index name.
For more information about creating indexes, see Create custom indexes in the Splunk Enterprise Managing Indexers and Clusters of Indexers manual.
Step 2: Configure search heads to write to the new indexes
Perform one of the following steps depending on your deployment:
On each search head, create local versions of the following files:
In each file, change the default ITSI index names to the new index names you want to use for the data from that search head. For more information, see How to edit a configuration file in the Splunk Enterprise Admin Manual.
Search head cluster
Make the changes described in the non-clustered steps above on the deployer at
etc/shcluster/apps and push the changes to the cluster members. For more information, see Deploy a search head cluster in the Splunk Enterprise Distributed Search manual.
Step 3: Restart your Splunk software
Restart your Splunk software or perform a rolling restart to put the changes into effect. For more information, see Restart the search head cluster in the Distributed Search manual.
Step 4: Confirm setup
On each search head, perform the following steps to confirm that searches are pointing to the correct indexes:
- In Splunk Web, navigate to Settings > Data inputs > HTTP Event Collector. Look for the renamed index names for the five ITSI event management tokens with the following source types:
- Check the Event Analytics Audit dashboard to make sure the searches run as expected. For more information, see Event Analytics Audit dashboard in the Event Analytics manual.
- Replace macro searches with the name of the renamed index. For example, the following searches should return the same events:
`itsi_event_management_index_with_close_events` | stats count AS events
index="<new name for itsi_tracked_alerts>" | stats count AS events
- Make sure the data is displaying as expected in service analyzers, deep dives, glass tables, and Episode Review.
- Verify that ITSI users can access the new indexes.
ITSI metrics summary index reference
Troubleshoot ITSI permissions, teams, backups, and restores
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.8.0 Cloud only, 4.8.1 Cloud only, 4.9.0, 4.9.1