Splunk® Enterprise

Troubleshooting Manual

Download manual as PDF

Download topic as PDF

Splunk on Splunk app

Splunk on Splunk (SoS) is an app that uses Splunk Enterprise diagnostic tools to analyze and troubleshoot your configuration. SoS contains views and tooling that allow you to do the following:

  • View, search and compare Splunk Enterprise configuration files.
  • Detect and expose errors and anomalies in your installation, including inspection of crash logs.
  • Measure indexing performance and expose event processing bottlenecks.
  • View details of scheduler and user-driven search activity.
  • Analyze Splunk Enterprise data volume metrics.

Download the Splunk on Splunk app from Splunkbase.

For information about installing and configuring the Splunk on Splunk app, see the Splunk on Splunk documentation.

Looking at your Splunk Enterprise installation with Splunk on Splunk

Each view offers help to explain the significance of the different charts and panels shown, as well as the searches that populate them.

The SoS app (version 1.0) contains the following views:

Home: Provides an introduction to SoS.

Configuration File Viewer: Provides a layered view of the Splunk Enterprise configuration files, allowing you to search and compare files side by side.

Errors: Parses Splunk Enterprise internal logs to help expose errors and abnormal behavior. Contains dedicated search controls to help you locate the source of problems.

Warnings: Detects known problems that may exist on your Splunk Enterprise instance.

Crash Log Viewer: Detects and displays recent crash logs and correlates them with Splunk Enterprise log files.

Indexing Performance: Tracks indexing performance, allowing you to correlate measured latency and data volume with the size of event processing queues.

Search Detail Activity: Displays CPU utilization for all searches, providing various ways to analyze and compare searches.

UI and User Search Activity: Provides analysis of dashboards most viewed, user activity, time to completion, and other related data for searches.

Scheduler Activity: Shows a variety of performance and usage metrics for the search scheduler. Also, displays statistics on alert actions associated with scheduled searches.

Metrics: Shows license usage over time as well as different breakdowns of indexing throughput (per source, per source type, per host, per index) recorded in metrics.log. Also provides statistics on incoming and outgoing network traffic.

PREVIOUS
Use btool to troubleshoot configurations
  NEXT
What Splunk software logs about itself

This documentation applies to the following versions of Splunk® Enterprise: 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.4.0, 6.4.1, 6.4.2, 6.4.3 View the Article History for its revisions.


Comments

Hi, I just tried to download the "Splunk on Splunk app" which be introduced on this page. But the Overview of the app show me the information below.
Since this manual is for ver 6.4.2, I believe the description of the Troubleshooting Manual is wrong.
Am I right? Or, I should ignore the information below, but try to use this app?

----------------------------------
IMPORTANT: As of Splunk Enterprise 6.3, the S.o.S app is End of Life. Its functionality has been replaced and superseded by the Distributed Management Console, a feature that is included with Splunk Enterprise as of version 6.2. We recommend that you migrate from S.o.S to the DMC for all your Splunk monitoring and introspection needs at your earliest convenience.
----------------------------------

Thanks.

Keigunyuki
July 20, 2016

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters