Splunk® App for Infrastructure

Install and Upgrade Splunk App for Infrastructure

Download manual as PDF

Download topic as PDF

Share data in Splunk App for Infrastructure

When the Splunk App for Infrastructure (SAI) is deployed on Splunk Enterprise, the Splunk platform sends data to Splunk Inc. ("Splunk"), and uses such data in accordance with the choices you made at the platform level. For information about how to opt in or out, and how the data is collected, stored, and governed, see Share data in Splunk Enterprise.

What data is collected

SAI collects the following additional basic usage information.

Component Description Example
app.session.deployment.type Shares whether you are using SAI or Splunk Insights for Infrastructure and the current page.
app: splunk_app_infrastructure    
deploymentType: INSIGHT    
page: investigate    
app.session.monitoringInsightsConfigureTabLoad Collects tab load time and usage for each integration to understand how the app is performing.
 app: splunk_app_infrastructure
 loadTime: 5887
 metadata: { [-]
   count: 55
   currentTab: ENTITY
   isInitialAppMount: true
   selectedView: LIST_VIEW
 }
 mode: production
 page: investigate
app.session.monitoringInsightsPageLoad Collects the page load time for each page visited to understand how the app is performing.
app: splunk_app_infrastructure
loadTime: 7397.100000000137
metadata: {
      count: 328
      currentTab: ENTITY
      selectedView: LIST_VIEW
      isInitialAppMount: true
    }
mode: production
page: SiiInvestigatePage
app.session.sai_ui_errors Collects the error stacktrace associated with a page crash to understand why the app crashed.
app: splunk_app_infrastructure
componentStack: 
 in Connect(ConfigurePageContentsContainer)
 in Profiler (created by PageLoadProfiler)
 in PageLoadProfiler
 in ErrorBoundary (created by ErrorBoundarySai)
 in ErrorBoundarySai
 in Provider
error: Cannot read property 'loadUserRoles' of undefined
mode: test
page: configure
app.sii.alertDefinitions Collects the hashed alert title, alert metric, and alert aggregation model to understand usage around alert creation.
alertAggregationMethod: Avg
alertMetricName: cpu.idle
hashedAlertTitle: af62ee3e8d96d58199f28ec9aa7a1d
app.sii.appVersion Collects the version of the app to understand new version adoption and usage.
appName: Splunk App for Infrastructure 
appVersion:  2.0.0
app.sii.backendPerformance Collects method and process names and the average and max times each takes to execute in the last hour.
 method: discover_entities
 process: entity_discovery
 stats: {
   avgSeconds: 1.2767429750499917
   maxSeconds: 2.735352039337158
 }
app.sii.groupDefinitions Collects the title, dimension key, and dimension value used to create each group to track the number of groups you create. The title and dimension value is always hashed, and the dimension key is hashed if you created it.
dimensionValue: mnjnkcxzjkjk2389
dimensionKey: dslkjksdiofuiuo3489589
groupTitle: kjhdsfhk4534&SD
}
app.sii.osType Collects a count of hashed OS names that collectd forwards to understand the diversity of entity types.
osCount: 43
osName: shk98sjckduy3ba8&ksd
}
Last modified on 08 July, 2020
PREVIOUS
Licensing the Splunk App for Infrastructure
  NEXT
System requirements for Splunk App for Infrastructure

This documentation applies to the following versions of Splunk® App for Infrastructure: 2.1.0, 2.1.1 Cloud only, 2.2.0 Cloud only


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters