Deployment Architecture

Store Search Head collect on Search Peer

LordLeet
Path Finder

Hello,

On my environment I have a Search Head and an Indexer Cluster, only with one Search Peer at the moment, both sharing the same indexes.conf file.

When I perform the collect command on the Search Head, the data is being stored on the Search Head itself instead of being sent to the Search Peer index.

From what I've read so far,it seems I might have to configure the Search Head as a Forwarder by adding the outputs.conf to its local folder. Is this the correct approach or am I missing something?

Thanks in advance.

0 Karma
1 Solution

harsmarvania57
SplunkTrust
SplunkTrust

Hi @LordLeet,

Yes, your approach is correct and it is best practice to send data from Search head to Indexer. For this configuration you can refer documentation http://docs.splunk.com/Documentation/Splunk/7.0.0/DistSearch/Forwardsearchheaddata

I hope this helps.

Thanks,
Harshil

View solution in original post

andrey2007
Contributor

Sure it is best practice to send data to undexer layer please look at the docs

http://docs.splunk.com/Documentation/Splunk/7.0.0/DistSearch/Forwardsearchheaddata

harsmarvania57
SplunkTrust
SplunkTrust

Hi @LordLeet,

Yes, your approach is correct and it is best practice to send data from Search head to Indexer. For this configuration you can refer documentation http://docs.splunk.com/Documentation/Splunk/7.0.0/DistSearch/Forwardsearchheaddata

I hope this helps.

Thanks,
Harshil

LordLeet
Path Finder

Thanks,

Did the required changes and managed to replicate the index content on the Search Peer with no issues.
Cleaned the events on the Search Head and can still access them from the Search Peer so it seems to be working as intended.

Regards

0 Karma
Get Updates on the Splunk Community!

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...

Let’s Get You Certified – Vegas-Style at .conf24

Are you ready to level up your Splunk game? Then, let’s get you certified live at .conf24 – our annual user ...