- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
I have an automated upgrade plan that does the following:
- Puts the cluster in maintenance mode
- splunk enable maintenance-mode
- Goes 1 by 1 on each of the 3 indexer peers and runs:
- splunk offline
- Extracts upgrade tar file to necessary location
- runs splunk start and accepts license and answers yes.
- repeats for the next peer
- Disables maintenance mode.
I am trying to upgrade the peers without the end users seeing messages but unfortunately users see things like the following:
Unable to distribute to peer named X because peer has status=Down. Verify uri-scheme, connectivity to the search peer, that the search peer is up, and that an adequate level of system resources are available.
^ Even though the peer is Up according to the Cluster Master
Connection Refused for peer=X
^ Which seems like the search heads are sending queries or still have an established connection with the peer. I would expect the search head to know that a peer is down and not communicate with it till it indexes have been validates and deemed searchable.
Anyone have recommendation on making the indexer upgrade as seamless to the end user as possible?
Things tried:
adjusted the restart_timeout, quiet_period, and decomission_node_force_timeout on the cluster master
Thanks,
J
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

You can quarantine an indexer server while you upgrade it. This prevents search heads from connecting to the indexer server for any new searches.
Check this for more info: https://docs.splunk.com/Documentation/Splunk/latest/DistSearch/Quarantineasearchpeer
If this reply helps you, an upvote/like would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

You can quarantine an indexer server while you upgrade it. This prevents search heads from connecting to the indexer server for any new searches.
Check this for more info: https://docs.splunk.com/Documentation/Splunk/latest/DistSearch/Quarantineasearchpeer
If this reply helps you, an upvote/like would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey manjunathmeti,
Thanks for the recommendation, however, it looks like quarantining the peers helped quiet the errors above but now the user sees the following:
One or more peers have been excluded from the search because they have been quarantined. Use "splunk_server=" to search the peers. This may affect search performance
Do you know of anyway to silence this message?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Disregard. To silence that message, you can set the target option to "none" in messages.conf.
Thank you for the solution to my question.
Respectfully,
J
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

You are welcome!
Instead of setting target to none, you can set it to log as suggested in the messages.conf documentation.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey manjunathmeti,
Have you used the 'target = log' or 'target = none' settings? Although the message.conf.spec file says they are keys that can be used, there are no examples of them used in any of the messages.conf default. I have the following in my messages.conf on all three search heads under '/opt/splunk/etc/system/local/messages.conf' and still get the warning messages on my search heads when a quarantined indexer restarts.
[DISPATCHCOMM:EXCLUDED_QUARANTINED_PEERS]
message = One or more peers has been excluded from the search because they have been quarantined. Use "splunk_server=*" to search these peers. This might affect search performance.
severity = info
target = log
Any ideas?
J
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

I didn't try this attribute. Did you try setting it to none?
You can try using other attributes, roles, capabilities to show the warnings to specific users/roles.
