Splunk Cloud Platform

Splunk Cloud Platform Admin Manual

Use the Workload (preview) dashboard

In CMC version 3.25.0, Splunk redesigned the Workload (preview) dashboard so you can better understand your usage and license entitlement metrics.

Preview features are provided by Splunk to you "as is" without any warranties, maintenance and support, or service level commitments. Splunk makes this preview feature available in its sole discretion and may discontinue it at any time. Use of preview features is subject to the Splunk General Terms.

If your organization has an ingest-based subscription, the SVC license entitlement metric and suggested thresholds are not applicable to your deployment. To determine the appropriate SVC entitlement for your deployment and to convert your ingest-based subscription to a workload-based subscription, contact your Splunk account representative.

To investigate your usage metrics over a specific time range and identify where you can optimize your organization's SVC consumption, navigate to Cloud Monitoring Console > License Usage >  Workload and select the Workload dashboard link.


What is Splunk Virtual Compute (SVC)?

SVC is a unit of capabilities that includes CPU, memory, and I/O. Overall SVC usage primarily considers CPU across search and indexing workloads. Splunk deploys infrastructure based on your entitled SVCs.

For more information about the SVC entitlement for your workload-based subscription, see Performance considerations in the Splunk Cloud Platform Service Description. Be sure to view the correct version for your Splunk Cloud Platform deployment version.

Top-level panels

The top-level panels display your deployment's peak usage indicators. Use these panels to get an idea about your deployment's peak SVC usage during a given time interval. Select the question mark icon for more information or see the following table to learn more about each indicator:

Panel Description
Overall • Peak SVC usage

Shows your organization's overall peak SVC usage as a single value and a percentage of your license entitlement.

Splunk deploys infrastructure based on your entitled SVCs. Overall peak SVC usage refers to the highest amount of resources used in a given time interval to perform system processes such as indexing, any running search processes, and shared services. It primarily measures the CPU usage across search and indexing workloads.

This panel provides usage color-coded threshold information. Generally, SVC usage should be less than 80% to maintain performance. Greater than or equal to 80% is considered elevated usage, and greater than or equal to 90% might cause degraded performance.

  • Green indicates usage is optimal and below the 80% threshold.
  • Yellow indicates usage is above or at the 80% threshold.
  • Red indicates usage is elevated, and above or equal to the 90% threshold.
Search • Peak SVC usage

Shows your organization's search workload peak SVC usage as a single value.

Search peak SVC usage refers to the highest amount of resources used in a given time interval to perform search processes. It primarily measures the CPU usage across search workloads. The search workload can occur on both the search and indexing tiers.

Indexing • Peak SVC usage

Shows your organization's indexing workload peak SVC usage as a single value

Indexing peak SVC usage refers to the highest amount of resources used in a given time interval to perform indexing processes. It primarily measures the CPU usage across indexing workloads. The indexing workload occurs on the indexing tiers.

Overall, search, and indexing workload panels

The next panel displays further information about your overall, search, and indexing workloads. Select the respective panel tabs to view detailed charts on specific processes.

Panel Description
Overall workload

Overall workload • Peak SVC usage

This panel shows your organization's SVC usage in the context of your license entitlement.

Select from the following views:

  • Overall: The highest amount of resources used in a given time interval to perform system processes such as indexing, any running search processes, and shared services.
  • By process: Overall peak SVC usage split by search processes, indexing processes, and shared services.
  • By tier: Peak SVC usage based on processes performed by the search head and indexing tiers.

Top 10 apps shows apps that contribute to the highest search time or estimated SVC usage.

Top 10 users shows users that contribute to searches with the highest search time or estimated SVC usage. These users may be human or virtual administrators.

One virtual administrator is the internal splunk-system-user, which runs jobs and processes like summary refreshes, report accelerations, and data model accelerations on behalf of a Splunk Cloud Platform customer. Running these processes consumes SVCs. If the SVC usage of splunk-system-user seems abnormal, contact the deployment's administrator to investigate the increased consumption.

Search workload

Search • SVC usage

The search workload encompasses search processes that occur on the search and indexing tiers. The sum of all these processes equals the peak SVC usage from search processes during this time interval.

Select from the View by options to view estimated SVC usage or search time in seconds.

Select from the following Search head options:

  • All: Shows all search heads in your Splunk Cloud Platform deployment. This category includes all the data ingested and processed in the deployment.
  • Specific search head name: Shows data for a specific search head that has been ingested, processed, and summarized in the deployment as of and after the CMC 2.9.0 release.

Select from the following Split by options:

  • Apps: Lists a maximum of the top 10 apps and their respective search workload SVC consumption or search time.
  • Users: Lists a maximum of the top 10 users and their respective search workload SVC consumption or search time. These users may be human or virtual administrators.
  • Searches: Shows which searches utilize the greatest search workload SVC or search time as a percentage of the total consumption.
  • Search type: Shows search types and their respective search time or estimated SVC consumption.
  • search launcher: Ephemeral searches that are managed by the search launcher, which is a splunkd helper process that is responsible for forking new search processes and managing a high number of fast-running searches on deployments. Because the individual ephemeral searches are being quickly processed, your deployment's SVC usage for these searches is based on the search launcher process to ensure an accurate SVC calculation.

Here are the following search types:

Dispatched and skipped search count per hour shows the number of searches per hour that are dispatched or skipped.

Indexing workload

Indexing workload • SVC usage

The indexing workload encompasses ingestion and indexing processes that occur on the indexing tier. The sum of all these processes equals the peak SVC usage from indexing processes during this time interval.

Select from the Split by options to view indexing processes by specific indexes or source types.

Ingestion by hour shows hourly rate of ingestion. When data ingestion rates are high, the indexer consumes more resources to process and ingest data. High ingestion rates can increase SVC usage.

Interpret Workload (preview) dashboard metrics

SVC utilization is not a direct measure of your deployment health. To better understand your deployment, navigate to the Health dashboard and see Use the Health dashboard.

You can turn on pre-configured alerts about your workload and SVC utilization with the Alerts dashboard. See Use the Alerts dashboard to learn more.

Optimizing search and indexing processes can improve SVC utilization and might improve system performance. To learn more, see Optimize indexing and search processes.

Last modified on 30 May, 2024
Use the License Usage dashboards   Use the Forwarder dashboards

This documentation applies to the following versions of Splunk Cloud Platform: 8.2.2112, 8.2.2201, 8.2.2202, 8.2.2203, 9.0.2205, 9.0.2208, 9.0.2209, 9.0.2303, 9.0.2305, 9.1.2308 (latest FedRAMP release), 9.1.2312, 9.2.2403


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters