Splunk on Splunk app
Splunk on Splunk app
Splunk on Splunk (SoS) is an app that uses Splunk Enterprise diagnostic tools to analyze and troubleshoot your configuration. SoS contains views and tooling that allow you to do the following:
- View, search and compare Splunk Enterprise configuration files.
- Detect and expose errors and anomalies in your installation, including inspection of crash logs.
- Measure indexing performance and expose event processing bottlenecks.
- View details of scheduler and user-driven search activity.
- Analyze Splunk Enterprise data volume metrics.
Download the Splunk on Splunk app from Splunkbase.
For information about installing and configuring the Splunk on Splunk app, see the Splunk on Splunk documentation.
Looking at your Splunk Enterprise installation with Splunk on Splunk
Each view offers help to explain the significance of the different charts and panels shown, as well as the searches that populate them.
The SoS app (version 1.0) contains the following views:
Home: Provides an introduction to SoS.
Configuration File Viewer: Provides a layered view of the Splunk Enterprise configuration files, allowing you to search and compare files side by side.
Errors: Parses Splunk Enterprise internal logs to help expose errors and abnormal behavior. Contains dedicated search controls to help you locate the source of problems.
Warnings: Detects known problems that may exist on your Splunk Enterprise instance.
Crash Log Viewer: Detects and displays recent crash logs and correlates them with Splunk Enterprise log files.
Indexing Performance: Tracks indexing performance, allowing you to correlate measured latency and data volume with the size of event processing queues.
Search Detail Activity: Displays CPU utilization for all searches, providing various ways to analyze and compare searches.
UI and User Search Activity: Provides analysis of dashboards most viewed, user activity, time to completion, and other related data for searches.
Scheduler Activity: Shows a variety of performance and usage metrics for the search scheduler. Also, displays statistics on alert actions associated with scheduled searches.
Metrics: Shows license usage over time as well as different breakdowns of indexing throughput (per source, per source type, per host, per index) recorded in metrics.log. Also provides statistics on incoming and outgoing network traffic.
This documentation applies to the following versions of Splunk: 4.2.3 , 4.2.4 , 4.2.5 , 4.3 , 4.3.1 , 4.3.2 , 4.3.3 , 4.3.4 , 4.3.5 , 4.3.6 , 4.3.7 , 5.0 , 5.0.1 , 5.0.2 , 5.0.3 , 5.0.4 , 5.0.5 , 5.0.6 , 5.0.7 , 5.0.8 , 5.0.9 , 5.0.10 , 5.0.11 , 5.0.12 , 5.0.13 , 6.0 , 6.0.1 , 6.0.2 , 6.0.3 , 6.0.4 , 6.0.5 , 6.0.6 , 6.0.7 , 6.0.8 , 6.0.9 , 6.1 , 6.1.1 , 6.1.2 , 6.1.3 , 6.1.4 , 6.1.5 , 6.1.6 , 6.1.7 , 6.1.8 , 6.2.0 , 6.2.1 , 6.2.2 , 6.2.3