General Splunk
NOTICE as of December 2, 2022, this entire topic has been updated and merged into our official docs on the page Migrating to a New Splunk Deployment.
We get asked fairly regularly about moving our app from one server to another. The answer to this question is very dependent on your environment.
In the below we talk about a migration strategy for a single standalone Splunk server with our apps on it, that’s acting as your SFTP server for your CUCM implementation, and doing no other duties.
We also include the reasonably easy extension to that situation of having your SFTP server be on another server which uses the Splunk Universal Forwarder (UF) to send the data in to the Splunk server.
Really, these are important, because they are quite load bearing.
Also, if you are completely new to Splunk and your current environment, here’s a great set of docs pages from Splunk on what to do when you have inherited a deployment you know nothing about. For our purpose, the most useful page of this is the one on the deployment topology.
Enough with the scary bits, Rich. Can you just tell me what to do?
Yes, I can, but just remember, we’re not responsible for this going sideways. 🙁
Get Splunk, the Cisco CDR app, and Canary all installed on the new server following these two sections of our docs:
and
Put in your Cisco CDR license key using our app’s Settings/Update License
Confirm any accounts are created in Splunk, email settings are right and so forth. For *this* step, most of this can all be done later too.
One of these important steps: Do NOT at this time set up a data input, we’ll use the fact there isn’t one set up later as an easier way to confirm SFTP is working.
If your SFTP server lives on this server too, then DO set up the SFTP server with the same user and password as the old one. You can change the username or the password for the SFTP account at this time if you want, but I’m recommending you not do that to keep our change surface area as small as possible.
Confirm you have Splunk running, our two apps on it, that you can log into it, that it is not in any way ingesting any CDR or CMR files.
Once it’s ready, shut off Splunk on it via services or via the command line. Leave the SFTP server running so that if we point CUCM at it the files will start accumulating in the SFTP server’s drop folder.
In old Splunk, click Splunk’s Settings/indexes. Find out the physical path to where the index cisco_cdr is. Note this value.
Make sure all Searches, Reports and Alerts that you want to migrate (e.g. “all valid and current ones”) are set to be shared in the app and not just private. This will make them easier to move later.
You can now start Splunk on the new server and confirm that Investigate Calls has your historical data. (Note customized reports and sites and stuff aren’t moved yet).
You can leave Splunk running on the new server at this time.
After this, you should see Browse calls not only having old data, but also having new data. (It might take a few minutes to “catch up” from the backlog.)
Assuming that all looks good, now we can migrate other things.
Do note you may not want to do this wholesale. You might want to pick and choose, leave the old server around for a while (alternate to that below) and just copy things as you need them.
Also note that if you had moved everything that’s needed to being shared in “App”, then mostly everything you want is in the local folder we just moved.
So maybe you don’t want to do this at all!
Anyway, if you did still want to do this, see “user-level config” at https://sideviewapps.com/documentation/cisco-cdr-reporting-analytics-administration-migrating-new-splunk-deployment
At this time, it should all be done.