Cloud & On-Prem:
Please install the following Apps on the same Cloud Search Head or Search Head Cluster you are intending to install and use Insights App for Splunk:
1. Splunk App for Lookup File Editing
2.Splunk Machine Learning Toolkit
Please note that you must install the Python for Scientific Computing Add-on before installing the Machine Learning Toolkit. Please download and install the appropriate version here:
- Mac: https://splunkbase.splunk.com/app/2881/
- Linux 64-bit: https://splunkbase.splunk.com/app/2882/
- Windows 64-bit: https://splunkbase.splunk.com/app/2883/
On-Prem:
The On-Prem Monitoring Console must be able to:
1. Search all production indexer clusters (customer may have more than one).
2. Configured to monitor all search heads (all stand alone and search head cluster members)
3. Configured to monitor all heavy forwarders (optional) - These should be configured as the Indexer role to ensure that index pipeline queues are visible. Note: You can deploy the Insights App for Splunk for DS & HF to the DS’s & HFs.
4. Any Splunk Enterprise instance in the customer environment should ideally be configured to show in the Monitoring Console
Cloud:
Install the Insights App for Splunk on the search head cluster and all standalone search heads.
On-Prem:
Installation should be done on a dedicated Search Head for the entire enterprise.
Customers should have existing Monitoring Console in place and configured, if not, configure a standalone search head as a Splunk Monitoring Console according to best practices and then proceed by configuring the dedicated Insights App for Splunk SH.
Insights App for Splunk Index Creation:
Cloud:
1. Login to any search head or search head cluster and create a new index:
2. Index name: ia4s_summary
3. Searchable Time: 400 Days
4. Additional Storage: None
On-Prem:
1. Login to the cluster manager and create a new index:
2. Index name: ia4s_summary
3. Searchable Time: 400 Days
Note for On-Prem customers:
If you have multiple Splunk environments that are separated physically and have its own dedicated Splunk Monitoring Console, Splunk Cluster Manager etc.., you can create a dedicated index for each using this example:
Env1: ia4s_summary_env1
Env2: ia4s_summary_env2
This will keep the data isolated at first and on the Insights App for Splunk enterprise Search Head, all of the data from all of the summary indexes will be combined.
Please be sure to use the naming convention in Appendix C - Monitoring Console Custom Groups Naming Convention
Insights App for Splunk Data Collection Configuration
Got to https://splunkbase.splunk.com/app/6489 and watch this video: https://youtu.be/fvU-uNh1huY also, scroll to find the Insights App for Splunk for Splunk Setup Screen screenshot.
Restore the Insights App for Splunk 101 KV Store Database
watch this video: https://youtu.be/fvU-uNh1huY
Setup the App identities
• Launch IA4S Setup and click on the Insights App for Splunk Custom Identities Gen Job hyperlink.
• The template job called splunk_identities_custom_kv_store_lookup_gen you can use to map your identity fields to Insights App for Splunk identities to help us expose how the various LOBs/SubLOBs, departments etc.. are using Splunk.
• The Most critical fields are: identity, emp_name, emp_type, emp_status, emp_title, emp_dep, emp_lob1, emp_city, emp_region1 & emp_country.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.