Upgrade the Splunk App for Microsoft Exchange
If you are using version 1.0 of the Splunk App for Microsoft Exchange and wish to upgrade to version 1.1, you must understand the changes between the previous version and this one. You must also follow some procedures to ensure that the new version of the app sees the existing data.
If your Splunk App for Microsoft Exchange deployment is large or complex, you might want to consult Splunk's Professional Services team for assistance.
Major differences between versions 1.0 and 1.1
The major differences between version 1.0 and 1.1 of the Splunk App for Microsoft Exchange are as follows:
- While version 1.0 of the app uses one index,
main
, to store its data, version 1.1 of the app uses three indexes:msexchange
for the Exchange, IIS and other application logsperfmon
for the Performance monitoring logsblackberry
for the Blackberry Enterprise Server (BES) logs
The updated app will not see data in the main
index without reconfiguration. Read the instructions below on how to reconfigure the app to look at the main
index.
- The forwarder application components (FACs, the directories within the app that begin with
fwd_*
, are deprecated and no longer needed. They are replaced by the technology add-ons (TAs) which perform the same function and are easier to install, deploy and configure.
- The Splunk App for Microsoft Exchange now requires an updated version of the Sideview Utils app. Make sure that you upgrade Sideview Utils to version 1.2.5 before upgrading the Splunk App for Microsoft Exchange. Review "Platform and hardware requirements" for specifics on what needs to be installed, and where.
Upgrade version 1.0 to version 1.1
If you are doing an in-place upgrade of the Splunk App for Microsoft Exchange from version 1.0 to 1.1, following are the steps you need to take to ensure that the updated version of the app is able to read data generated by the older version. There are several steps to this process:
Remove the forwarder application components
The first step in reconfiguring the Splunk App for Microsoft Exchange is to remove all FACs from all of the servers in your Splunk App for Microsoft Exchange deployment. This prevents data from getting incorrectly indexed into the app after you upgrade. The FACs must be removed from every Exchange server on which you installed a universal forwarder, as well as the central Splunk App for Microsoft Exchange instance.
- If you are running a deployment server, you can simply remove the
fwd_*
directories from%SPLUNK_HOME%\etc\deployment-apps
on that server. - If you are not running a deployment server, you will need to manually remove the
fwd_*
components from%SPLUNK_HOME%\etc\apps
on each server.
Upgrade the Splunk App for Microsoft Exchange
Next, install the new Splunk App for Microsoft Exchange on the central Splunk instance (or on indexers and search heads) in the deployment.
- Read "What a Splunk App for Microsoft Exchange deployment looks like" for specific installation instructions.
- Do not install the app on the universal forwarders on your Exchange servers.
Deploy the technology add-ons to the appropriate servers in your environment
Once you have removed the FACs, you must then deploy the technology add-ons as required to all servers in your Splunk App for Microsoft Exchange deployment.
- Read "What a Splunk App for Microsoft Exchange deployment looks like" for information on which specific servers the new TAs need to be installed. Note that some installation locations have changed from version 1.0.
- Read "Deploy configurations for all server roles" in this manual for instructions on how to deploy the new TAs to your Splunk App for Microsoft Exchange environment.
Configure the Splunk App for Microsoft Exchange to include the 'main' index
The final step in upgrading the Splunk App for Microsoft Exchange is to reconfigure the upgraded app to include the main
index, as well as the three new indexes, to store and retrieve data.
- Read "Make configuration changes to match your existing environment" for specific instructions on how to configure the event types for the central Splunk App for Microsoft Exchange instance to include the
main
index in both indexing and searching operations.
- The new entries in
eventtypes.conf
must include both themain
and either themsexchange
,perfmon
, orblackberry
indexes, depending on the event types that you are changing.
Install the central Splunk for Microsoft Exchange app instance | Log in and get started |
This documentation applies to the following versions of Splunk® App for Microsoft Exchange (EOL): 1.1, 1.1.1, 1.1.4, 1.1.5, 1.1.6
Feedback submitted, thanks!