Splunk® Enterprise

Distributed Search

Download manual as PDF

This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Download topic as PDF

Migrate from a standalone search head to a search head cluster

You can migrate settings from an existing standalone search head to all members in a search head cluster.

Important: You cannot migrate the search head instance itself, only its settings. You can only add clean, new Splunk Enterprise instances to a search head cluster.

Important points to consider

There are a few points to keep in mind when migrating your settings to a search head cluster.

Do not migrate default apps

When you migrate apps to the search head cluster, do not migrate any default apps, that is, apps that ship with Splunk Enterprise, such as the search app. If you push default apps to cluster members, you overwrite the version of those apps residing on the members, and you do not want to do this.

It is, however, fine to migrate any private objects associated with the default apps. Private objects are located under the etc/users directory, not under etc/apps.

Migrated settings get placed in default directories

The deployer puts all migrated settings into default directories on the cluster members. This includes any runtime changes that were made while the apps were running on the standalone search head.

Because users cannot change settings in default directories, this means that users cannot perform certain runtime operations on migrated entities:

  • Delete. Users cannot delete any migrated entities.
  • Move. Users cannot move these settings from one app to another.
  • Change sharing level. Users cannot change sharing levels. For example, a user cannot change sharing from private to app-level.

Users can override existing attributes by editing entities in place. Runtime changes get put in the local directories on the cluster members. Local directories override default directories, so the changes override the default settings.

For more information on where deployed settings reside on the cluster members, see See "Location on the cluster members."

Note: Splunk does not support migration of per-user search history files.

Migrate settings to a search head cluster

To migrate settings:

1. Copy the $SPLUNK_HOME/etc/apps and $SPLUNK_HOME/etc/users directories on the standalone search head to a temporary directory where you can edit them.

2. In the temporary directory, delete these subdirctories:

  • Any default apps, such as the search app. Do not push default apps to the cluster members. If you do, they will overwrite the versions of those apps already on the members.
  • Any apps already existing in the deployer's distribution directory. Otherwise, the versions from the standalone search head will overwrite the versions already on the members.

3. Copy the remaining subdirectories from the temporary location to the distribution directory on the deployer. The distribution directory is located at $SPLUNK_HOME/etc/shcluster. Leave any subdirectories already in the distribution directory unchanged.

For details on the distribution directory file structure, see "What the configuration bundle contains."

4. If you need to add new cluster members, you must deploy clean instances. You cannot reuse the existing search head. For information on adding cluster members, see "Add a cluster member."

5. Use the deployer to push the configuration bundle, including the migrated settings, to the cluster members. See "Push the configuration bundle."

Important: If you point the cluster members at the same set of search peers previously used by the standalone search head, the cluster will need to rebuild any report acceleration summaries or data model summaries resident on the search peers. It does this automatically. It does not, however, automatically remove the old set of summaries.

Use a load balancer with search head clustering
Migrate from a search head pool to a search head cluster

This documentation applies to the following versions of Splunk® Enterprise: 6.2.0, 6.2.1, 6.2.2, 6.2.3

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters