Windows performance monitoring - remote
Whether you want to watch disk I/O, memory metrics such as free pages or commit charge, or network statistics, Splunk Enterprise is a capable alternative to Windows Performance Monitor.
To collect performance metrics remotely with Splunk Enterprise:
A. Go to the Add New page
You add an input from the Add New page in Splunk Web. You can get there by two routes:
- Splunk Home
- Splunk Settings
It doesn't matter which route you use; the Add New page itself is the same either way.
Via Splunk Settings:
1. Click Settings in the upper right-hand corner of Splunk Web.
2. In the Data section of the Settings pop-up, click Data Inputs.
3. Click Remote performance monitoring.
4. Click the New button to add an input.
Via Splunk Home:
1. Click the Add Data link in Splunk Home.
2. Click Monitor to monitor performance data from the local Windows machine, or Forward to forward performance data from another Windows machine. Splunk Enterprise loads the "Add Data - Select Source" page.
Note: Forwarding performance data requires additional setup.
3. In the left pane, locate and select Local Performance Monitoring.
B. Select the input source
1. In the Collection Name field, enter a unique name for this input that you will remember.
2. In the Select Target Host field, enter the host name or IP address of the Windows computer you want to collect performance data from.
3. Click the "Query" button to get a list of the performance objects available on the Windows machine you specified in the "Select Target Host" field.
Win32_PerfFormattedData_* classes do not show up as available objects in Splunk Web. If you wish to monitor
Win32_PerfFormattedData_* classes, you must add them directly in
4. Choose the object that you want to monitor from the Select Class list. Splunk Enterprise displays the "Select Counters" and "Select Instances" list boxes.
Note: You can only add one performance object per data input. This is due to how Microsoft handles performance monitor objects. Many objects enumerate classes that describe themselves dynamically upon selection. This can lead to confusion as to which performance counters and instances belong to which object, as defined in the input. If you need to monitor multiple objects, create additional data inputs for each object.
5. In the Select Counters list box, locate the performance counters you want this input to monitor.
6. Click once on each counter you want to monitor. Splunk Enterprise moves the counter from the "Available counter(s)" window to the "Selected counter(s)" window.
7. To unselect a counter, click on its name in the "Available Items" window. Splunk Enterprise moves the counter from the "Selected counter(s)" window to the "Available counter(s)" window.
8. To select or unselect all of the counters, click on the "add all" or "remove all" links. Important: Selecting all of the counters can result in the indexing of a lot of data, possibly more than your license allows.
9. In the Select Instances list box, select the instances that you want this input to monitor by clicking once on the instance in the "Available instance(s)" window. Splunk Enterprise moves the instance to the "Selected instance(s)" window.
Note: The "_Total" instance is a special instance, and is present for many types of performance counters. This instance is the average of any associated instances under the same counter. Data collected for this instance can be significantly different than for individual instances under the same counter.
For example, when monitoring performance data for the "Disk Bytes/Sec" performance counter under the "PhysicalDisk" object on a system with two disks installed, the available instances displayed include one for each physical disk - "0 C:" and "1 D:" - as well as the "_Total" instance. In this case, the "_Total" instance is the average of the two physical disk instances.
10. In the Polling interval field, enter the time, in seconds, between polling attempts for the input.
11. Click the green Next button.
C. Specify input settings
The Input Settings page lets you specify application context, default host value, and index. All of these parameters are optional.
1. Select the appropriate Application context for this input.
2. Set the Host name value. You have several choices for this setting. Learn more about setting the host value in "About hosts".
- Note: Host only sets the host field in the resulting events. It does not direct Splunk Enterprise to look on a specific host on your network.
3. Set the Index that Splunk Enterprise should send data to. Leave the value as "default", unless you have defined multiple indexes to handle different types of events. In addition to indexes for user data, Splunk Enterprise has a number of utility indexes, which also appear in this dropdown box.
4. Click the green Review button.
D. Review your choices
After specifying all your input settings, you can review your selections. Splunk Enterprise lists all options you selected, including but not limited to the type of monitor, the source, the source type, the application context, and the index.
Review the settings. If they do not match what you want, click the white < button to go back to the previous step in the wizard. Otherwise, click the green Submit button.
Splunk Enterprise then loads the "Success" page and begins indexing the specified performance metrics.
For more information on getting performance monitor data from remote machines, see "Monitor WMI data" in the Getting Data In manual.
Windows performance monitoring - local
Windows Active Directory
This documentation applies to the following versions of Splunk® Enterprise: 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 6.2.10, 6.2.11, 6.2.12, 6.2.13, 6.2.14, 6.2.15, 6.3.0