All Apps and Add-ons

Splunk Add-on for Atlassian JIRA Alerts: How should this add-on be deployed and configured in a Search Head Cluster?

pullu
Explorer

I cannot successfully deploy the Splunk Add-on for Atlassian JIRA Alerts in a search head cluster and configure it properly to access my Jira server. I have managed to do it on a single-node search head. Any indication of the correct procedure to follow?

0 Karma

adonio
Ultra Champion

hi pullu,
looks like this app installation instruct you to add an alert on the search app among some other setup steps
I dont see where it says it supports SHC. from little experience, apps / add-ons that require setup will be first configured on a single search head and. when that is done and the app works to your satisfaction, place on Deployer and distribute to SHC members.
Or better install on HF
See also other answers above by @woodcock @muebel and @ssievert
hope it helps

0 Karma

woodcock
Esteemed Legend

I agree with @muebel with the added caveat that you should make sure that all of your Indexers/Heavy Forwarders/Search Heads should share the same secret This way if you encode any credentials in your setup process, the encoding will be usable by any other server that gets the configuration files:

$SPLUNK_HOME/etc/auth/splunk.secret
0 Karma

muebel
SplunkTrust
SplunkTrust

Hi pullu, As ssievert mentioned, you'll likely want to at least start out by installing the app on a standalone instance of Splunk, and run through the setup. The app will need configuration specific to your jira instance in order to connect and create tickets.

Once the app has been configured, you'll probably be able to zip it up and put it on the Search Head Cluster Deployer, and apply the bundle to the cluster. This will hardset any configuration, and if you need to update it down the road you'll have to update the app on the deployer and repush the bundle.

Please let me know if this answers your question! 😄

0 Karma

adonio
Ultra Champion

hi pullu,
looks like this app installation instruct you to add an alert on the search app among some other setup steps
I dont see where it says it supports SHC. from little experience, apps / add-ons that require setup will be first configured on a single search head and. when that is done and the app works to your satisfaction, place on Deployer and distribute to SHC members.
Or better install on HF
hope it helps

0 Karma

pullu
Explorer

Managed to implement this by first configuring it on the deployer, than moving it to the cluster folder for distribution to SHC members. Thanks for the tip!

0 Karma

adonio
Ultra Champion

you are welcome,
Will copy paste my comment to an answer. please accept to close the quesion
Cheers

0 Karma

s2_splunk
Splunk Employee
Splunk Employee

You will likely need to configure this Add-on outside of your SHC on a Heavy Forwarder.

0 Karma
Get Updates on the Splunk Community!

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...

Let’s Get You Certified – Vegas-Style at .conf24

Are you ready to level up your Splunk game? Then, let’s get you certified live at .conf24 – our annual user ...