Manage Splunk POD
Manage your Splunk POD cluster using the Splunk Kubernetes Installer to retrieve credentials, access network information, and manage apps.
Use the Kubernetes Installer for Splunk POD to manage your Splunk POD cluster. Get credentials, access live network connections, install and update apps such as Splunk Enterprise Security (ES), and more.
Access Splunk Web
To access the Splunk Web interface and other management consoles, retrieve the auto-generated credentials and identify the correct service ports.
View local documentation
Access documentation and installation-specific network information directly from your web browser.
Manage apps
The Splunk Kubernetes Installer uses the SOK app framework to manage apps within the Splunk POD cluster.
The Kubernetes Installer for Splunk POD uses the SOK app framework to manage apps within the Splunk POD cluster. The app framework installs new or updated apps at 15-minute intervals. For more information, see the App Framework Resource Guide.
Install Splunk Enterprise Security
To install the Enterprise Security (ES) premium app on your Splunk POD cluster, add the following items to your static cluster configuration file.
To install the Splunk Enterprise Security (ES) premium app on the Splunk POD cluster, add the following details to the static cluster configuration YAML file:
- standalone stanza (pod-small): Specify a name of your choice in the standalone stanza, for example es-sh. Splunk POD small supports ES installation on standalone search heads only.
- searchheadcluster stanza (pod-medium and pod-large): Specify a name of your choice in the searchheadcluster stanza, for example es-shc. Splunk POD medium and large support ES installation on search head clusters only.
- Premium apps: List the ES app package under the standalone[].apps.premium scope.
- Indexer apps: List the apps to install on indexers (e.g. Splunk_TA_ForIndexers) under the clustermanager.apps.cluster scope.
Example: pod-small with ES. (Deploys 2 standalone search heads: one standard and one with ES):
clustermanager:
apps:
cluster: ["./Splunk_TA_ForIndexers_8.1.1.tgz"]
standalone:
- name: core-sh
apps:
local: ["./performance-insights-for-splunk_118.tgz"]
- name: es-sh
apps:
local: []
premium: ["./splunk_app_es-8.1.1.tgz"]
Example: pod-medium and pod-large with ES. (Deploys 2 SHCs: one standard and one with ES):
searchheadcluster:
# Port 443
- name: core-shc
apps:
cluster: ["./performance-insights-for-splunk_118.tgz"]
# Port 8100
- name: es-shc
apps:
cluster: []
premium: ["./splunk_app_es-8.1.1-176740.tgz"]
For details on configuring standalone search heads and search head clusters, see Static cluster configuration file reference.
Create indexes
You cannot create indexes through the Splunk UI in a POD environment. Instead, you must define them within a custom app.
Manage knowledge objects
The system handles knowledge objects differently based on their origin.
The system handles knowledge objects differently based on their origin.
- Non-Local App Content (/default): The installer copies this content from the bastion host to SeaweedFS. You can upgrade this content, but you cannot delete it.
- Local App Content (/local): Users create this content through the Splunk UI. The system replicates these objects among search heads (in a Search Head Cluster) and protects them from installer overwrites.
Note: The installer framework does not back up local content externally.
Manage Universal Forwarders
The Kubernetes Installer does not manage or interact with Splunk Universal Forwarders (UF).
Manage Universal Forwarders (UF) independently of the installer. This includes setting up a secure S2S connection that allows forwarders to send data to the cluster.
Key considerations for UF management:
- Manual management: Use agent management (deployment server) on the bastion node or a third-party tool (such as Ansible) to manage forwarder configurations. See About agent management.
- Security requirements: Forwarders require specific security apps and TLS certificates to communicate with the cluster.
- Load balancing: Manually configure the outputs.conf server list with multiple worker node IPs or DNS names to ensure high availability.
For details on establishing secure S2S connections for Universal Forwarders, see Network routing and ingress for Splunk POD.
Use Federated Search in Splunk POD
Splunk POD supports Federated Search in standard mode, allowing you to run searches across multiple clusters.
Use Federated Search in standard mode to run searches across Splunk POD clusters or from a Splunk POD cluster to a remote deployment. No specific configuration changes to Splunk POD or the Splunk Kubernetes Installer are required to enable this feature.
Follow the Splunk documentation to configure Federated Search from the Splunk UI on the local deployment. Use the endpoint https://<any federated provider POD worker IP>:443. No configuration is required on the Splunk POD clusters acting as federated providers.
Federated Search limitations
- Because every Splunk POD cluster uses the same server names for indexers (for example,
splunk-idx-indexer-0), it is difficult to isolate search results for a specific cluster without using index filtering. - Default IP-based routing requires that Federated Search links use specific IP addresses. If a worker node goes offline or is replaced, you must manually re-establish the link to the cluster.
Monitor Splunk POD
Tools and ports used for monitoring Splunk Enterprise components and the POD environmemt.
For comprehensive monitoring of Splunk Enterprise components, including search heads, indexers, cluster manager, license manager, and so on, use the Splunk Monitoring Console. This is available on port 3443 of any worker node (https://<worker_node>:3443).
For more information, see About the Monitoring Console.