Splunk® Enterprise

Inherit a Splunk Enterprise Deployment

Download manual as PDF

Download topic as PDF

Monitor system health

If you have the monitoring console configured, you can use platform alerts and the health check to monitor your system health.

If you do not have the monitoring console configured, this topic directs you to a few tools to get started. But if you have read and understand the content in the previous several topics, it might be time to think about setting up the monitoring console.

With the monitoring console

Run a health check

The monitoring console comes with preconfigured health checks in addition to its preconfigured platform alerts. You can modify existing health checks or create new ones.

See Access and customize health check in Monitoring Splunk Enterprise.

Understand platform alerts

Platform alerts are saved searches included in the Monitoring Console. Platform alerts notify Splunk Enterprise administrators of conditions that might compromise their Splunk environment. Notifications appear in the Monitoring Console user interface and can optionally start an alert action such as an email.

See which platform alerts are enabled:

  1. In the monitoring console, click Overview.
  2. Scroll down the dashboard until you see the Triggered Alerts panel.
  3. Click Enable or Disable to get to the Platform Alerts Setup page.
  4. Look for an enabled alert.
  5. Click Advanced edit to see what alert actions exist for that alert. Add your email address if you want to receive email alerts. If you do not set up an alert action like Send an email, view any triggered alerts in the monitoring console Overview dashboard.

See Platform alerts in Monitoring Splunk Enterprise for instructions for adding alert actions and for a list of available platform alerts.

Rebuild the forwarder asset table

If a forwarder is decommissioned, it remains on the forwarder dashboards until you rebuild the forwarder asset table. This step might not be immediately necessary, but if you find that your forwarder dashboards contain null results from several forwarders, you can rebuild the asset table.

  1. In the monitoring console, click Settings > Forwarder Monitoring Setup.
  2. Click Rebuild forwarder assets.
  3. Select a time range or leave the default of 24 hours.
  4. Click Start Rebuild.

Without the monitoring console

Ensure that internal logs are searchable

Make sure that your deployment is following the best practice recommendation of forwarding internal logs, in both $SPLUNK_HOME/var/log/splunk and $SPLUNK_HOME/var/log/introspection, to indexers from all other instance types. See Best practice: Forward search head data in the Distributed Search Manual. These other instance types include:

  • search heads
  • license masters
  • cluster masters
  • deployment servers

See What Splunk software logs about itself in Troubleshooting Splunk Enterprise for an overview of the Splunk Enterprise internal log files.

Survey existing monitoring apps

Survey your deployment for apps monitoring system health, either from Splunkbase or a custom app that a previous administrator developed.

  • The Fire Brigade app gives you insight into the health of your indexers.
  • The popular Splunk on Splunk app (SoS) reached its end of life with Splunk Enterprise 6.3.0 and most of its functionality was incorporated into the monitoring console. If your monitoring strategy relies on SoS, consider upgrading to the monitoring console.

Use default monitoring tools

Even without the monitoring console, there are a few resources that are included in Splunk Enterprise for you to check your system health. You can view some status information about indexer clustering, search head clustering, KV store, and errors that Splunk software logs internally.

For information on indexer clustering dashboards, see View the master dashboard and the two following topics in Managing Indexers and Clusters of Indexers.

You can run status checks on portions of your deployment using the Splunk command line, like search head clustering and KV store.

You can check components of a search head cluster from the command line. See Use the CLI to view information about a search head cluster in the Distributed Search manual.

Check KV store status:

  1. Log into a search head.
  2. In a terminal window, navigate to the bin directory in the Splunk installation directory.
  3. Type ./splunk show kvstore-status


See About the CLI in the Admin Manual for information about using the Splunk CLI.

Generate a report of general errors:

  1. Log into Splunk Web on a cluster master or search head.
  2. Click Apps > Search & Reporting.
  3. Click Reports > Splunk errors last 24 hours.

Look for custom monitoring tools

In addition to a custom monitoring app, your previous admin might have created some custom reports or alerts for system health. Look for custom reports or alerts:

  1. In Splunk Web on a cluster master or search head, go to Settings > Searches, reports, and alerts.
  2. Review any alert actions and make sure that they meet your requirements.
  3. (Optional) Add your email address or a custom script.

Plan a monitoring strategy

Any production Splunk Enterprise deployment requires robust, proactive monitoring to minimize down time and other problems.

Your Splunk Enterprise monitoring strategy needs to address the following points, the monitoring of which is included in the monitoring console:

  • CPU load, memory utilization, and disk usage
  • On a *nix system, OS level settings such as THP and ulimits
  • Indexing rate
  • Skipped searches
  • Bad data onboarding practices


Consider setting up the monitoring console. More than likely, this will consist of provisioning a new machine for this use. See Multi-instance deployment Monitoring Console setup steps in Monitoring Splunk Enterprise.

PREVIOUS
Learn about licensing
  NEXT
Investigate knowledge object problems

This documentation applies to the following versions of Splunk® Enterprise: 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.3.0, 7.3.1


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters