Use navigators in Splunk Infrastructure Monitoring 🔗
In Splunk Infrastructure Monitoring, a navigator is a collection of resources that lets you monitor metrics and logs across various instances of your services and detect outliers in the instance population based on key performance indicators. Resources in a navigator include, but are not limited to, a full list of entities, dashboards, related alerts and detectors, and service dependencies.
View all navigators 🔗
To see all navigators, select Infrastructure from the Splunk Observability Cloud home page.
On the Infrastructure Monitoring landing page, each card represents a navigator, corresponding to the services you monitor in Splunk Observability Cloud. A navigator card shows a count of instances in the population and highlights critical alerts linked to that population.
Monitor all instances in a navigator 🔗
In most navigators, you have two options to monitor your instances: table view and heat map view.
By default, for AWS, Azure, and select GCP navigators (Google Compute Engine, Google Kubernetes Engine, and Google Cloud Storage), if the region property is available on your data, your instances are grouped by region. Default grouping is applied to both table and heat map views.
The following table shows how instances are sorted in each view:
Instance monitoring option
Default view for a navigator.
Instances are sorted in descending order based on the relative value of the metric you select from the Color by drop-down menu.
Heat map view
Each square has a color that represents the relative value of the metric you select from the Color by drop-down menu.
In table view, some columns might be missing data for instances reporting through the Splunk Distribution of OpenTelemetry Collector in the Amazon EC2, GCP Compute Engine, and Azure Virtual Machines navigators. This is due to differences in property names between the Splunk Distribution of OpenTelemetry Collector and native agents such as CloudWatch.
For information on customizing the content and format of the navigator, including filtering, grouping, and more, see Customize navigator display.
For interactive walkthroughs of how to use navigators in Infrastructure Monitoring to troubleshoot your web server or observe your application and the underlying infrastructure, see Splunk Infrastructure Monitoring web server troubleshooting scenario and Splunk Infrastructure Monitoring application monitoring scenario.
The format and content displayed in the navigator for AWS Lambda is different from what is discussed below.
Drill down 🔗
In heat map view, when you hover over a square in a navigator, you can see the information about the instance represented by the square. Click a square to drill down into that instance.
Alternatively, while in table view, you can click the instance ID of an instance to drill down into that instance.
For example, if you click a square representing a host instance, you can see system metrics information in the built-in dashboard with charts. You can also find various properties of the host, processes running on the host, and so on on the Properties sidebar.
The color or statistics for an element might change as you drill down or click through your system. This is because the information might be refreshed between the time you begin navigating and the time a target element is displayed.
As you drill down into a single instance, you can use the breadcrumb trail to switch to the drilldown view of another instance or to return to the navigator view.
Display related resources or views 🔗
In the drilldown view of a host instance, available related resources appear in a navigation menu at the bottom.
Related resources and views are currently only available for host instances.
You can click available related resources that navigate to other Splunk Observability Cloud components, or other views of the same host in a different context.
The following example shows you how to navigate from the drilldown view of a single host to Splunk Log Observer view and back:
Select Navigation menu > Infrastructure.
Select Hosts under My Data Center.
Click a square to select a host instance you want to drill down into. For instance, you want to look into the details of a host named
Once you are in the drilldown view for
ip-10-0-3-92.us-west-2.compute.internal, you can navigate to Splunk Log Observer to see all logs for the same host by clicking Logs for host ip-10-0-3-92.us-west-2.compute.internal on the related resources navigation menu.
If you click any log on the list, the related resources navigation menu shows up. To navigate back to the drilldown view for the same host instance, click Host called ip-10-0-3-92.us-west-2.compute.internal on the related resources navigation menu.
Use the Dashboard section 🔗
The Dashboard section contains built-in dashboards that provide access to detailed information about the instances displayed.
Dashboards in navigators are read‑only, so you can’t directly make any changes to them. However, you can clone a built-in dashboard to make changes to the clone, or download a built-in dashboard.
Amazon EC2, GCP Compute Engine, and Azure Virtual Machines instances are powered by their respective public cloud services as well as the Splunk Distribution of OpenTelemetry Collector. You need both for all the charts to display data in the built-in dashboards.
If you have only the public cloud service and the Smart Agent configured, some charts in the built-in dashboards for Amazon EC2, GCP Compute Engine, and Azure Virtual Machines instances display no data.
If you have only the public cloud service configured, you can see all the cards representing the services where data come from, but some charts in the built-in dashboards for Amazon EC2, GCP Compute Engine, and Azure Virtual Machines instances display no data.
If you have only Smart Agent configured, Amazon EC2, GCP Compute Engine, and Azure Virtual Machines instance navigators aren’t available.
Customize navigator display 🔗
The control bar within each navigator lets you modify which instances are shown, how they are grouped, which metric you are focusing on, and so on.
Add filter 🔗
Click Add Filter to create a filter and view a specific slice of your environment based on dimensions or properties you specify. Filtering is particularly useful for viewing only the instances running a specific service, or in a particular availability zone.
Filters that you apply to your host instances also filter dependencies in the navigator sidebar. To learn more about the navigator sidebar, see View dependencies in the navigator sidebar in the same topic.
Customize time range 🔗
By default, you see data from the last three hours. You can use the time picker to select a new time range. When you select a new time range, the navigator updates to show the status of instances during that time.
If the time between the end and start dates of your selected time range is more than seven days, the navigator might take longer to respond.
Color by 🔗
Use the Color by drop-down menu in the control bar to specify the metric you want to use to color the squares. Square color values vary depending on which Color‑by criteria you choose.
For example, if you select CPU Utilization, colors range from green (lowest 20% of values among all instances) to red (highest 20% of values among all instances). For many metrics, red indicates intensity of performance rather than a problem situation.
White squares indicate instances that do not emit values for the specified metric.
Black squares indicate instances considered “dead” by Infrastructure Monitoring because they do not emit values for a specified period of time.
You can specify settings related to these non-emitting instances by selecting Navigator Settings from the Actions menu. When the instances begin emitting values again, the squares are recolored accordingly.
Group by 🔗
Use the Group by drop-down menu in the control bar to partition instances by the selected dimension or property. As you hover over or select the different options in the list, the instances immediately rearrange themselves in the navigator. This feature lets you do a hierarchical grouping of up to two levels.
In some cases, you might see an option titled “n/a” in the drop-down menu. This group contains instances that don’t have a value for the Group‑by dimension or property you specify.
When you specify a Group‑by field, you can select a group name to filter the navigator to only show the instances in that group. The breadcrumb trail updates to indicate your selected group.
Find outliers 🔗
Apply outlier detection to identify instance outliers in your data. Outliers are denoted by the color red based on values of the Color by metric.
Outlier detection can be determined by one of two strategies that are common in data analysis:
Deviation from population mean
Highlight instances with values significantly higher than the average value of other instances. This strategy tends to highlight only those instances with the most extreme values, and provides meaningful results only when you have a large number of instances (15 or more).
Deviation from the population median
Highlight instances with values significantly higher than the median value of other instances. If there are relatively small differences in value among the majority of instances, this strategy tends to highlight any instance which is not part of this majority.
For example, if instances are grouped by the service that they are running, colored by
cpu.utilization, and outlier detection is enabled, then instances that use significantly more CPU than their others are highlighted in red. You can then investigate those specific instances to determine why they are behaving differently.
While both outlier strategies highlight instances that are behaving differently from others, if the population has two groups of outliers, such as when most instances are running at 20% CPU utilization but three are running at 60% one is running at 80%, deviation from mean finds the greater outlier (instances running at 80%), while the deviation from median can typically identify both groups. You can always switch from one strategy to another to find the one that works best for your specific environment.
The Find Outliers feature also provides a population selector that lets you restrict the comparison population to only those instances that have similar characteristics (as defined by the Group By dimension). For example, you might not want to compare a server against others that are running different software. It is more relevant to determine outliers among servers providing the same service. Grouping instances by the service that they run and using that as your population basis ensures that instances are compared only with their peers to determine if they behave abnormally.
View dependencies in the navigator sidebar 🔗
Available only for Kubernetes, hosts, and virtual hosts.
In navigators for Kubernetes, hosts in My Data Center, and virtual hosts, Amazon EC2, Azure Virtual Machines, and Google Cloud Platform, you can track dependent services and containers in the navigator sidebar.
Best practice 🔗
To get the most out of the navigator sidebar, configure the services you want to track in the Splunk Distribution of OpenTelemetry Collector configuration file as
service.name values under
extraDimensions. By configuring
service.name values, you can see more details about your data, such as which individual services are running on specific host instances.
For example, the
redis-cart service is included in this Splunk Distribution of OpenTelemetry Collector configuration.
receiver_creator: receivers: smartagent/redis: rule: type == "pod" && name contains "redis" config: type: collectd/redis host: redis-cart port: 6379 extraDimensions: service.name: redis-cart
For more information on the Splunk Distribution of OpenTelemetry Collector configuration, see Components.
Navigate to services using the navigator sidebar 🔗
The following example shows you how to navigate to a Cassandra service from the Amazon EC2 navigator, assuming you have the Cassandra
In this Amazon EC2 navigator, Cassandra and Kafka services are running on the Amazon EC2 instances. Each tile in the navigator sidebar represents a service type.
To see the full list of Cassandra services, hover over or select the Cassandra tile.
To search for a specific service, type the name of the service in the search field.
You can only search when there are configured services. If no individual services are configured, the search bar doesn’t appear.
When you have a large number of running service types or services, the navigator sidebar might hide some of them and instead display the text Show all services. Use search to find a specific service without having to expand the entire list.
For example, type
metadatato look for service names containing the keyword.
Select a Cassandra service to navigate to the navigator or dashboard for that service. When both navigator and dashboard are available for a service, clicking that service opens the navigator.
View alerts using navigators 🔗
If a service has any active alerts, you can view a list of the service’s alerts through navigators.
Select Infrastructure from the Splunk Observability Cloud home page.
Search for the navigator that you want to view.
Under the navigator title, select the text displaying the number of alerts. Alert numbers and types vary depending on the navigator.
For the following example navigator, the user selects 90 Critical alerts.
Selecting this text opens a detailed view of the navigator with a list of active alerts shown on the sidebar.
Remove an inactive navigator 🔗
You need to be an admin to remove a navigator.
When data for an integration hasn’t been received for 72 hours, the navigator for that integration becomes inactive and you have the option remove it from view. The navigator automatically reappears if data for the integration comes in again.
Follow these steps to remove an inactive navigator.
Select Infrastructure from the Splunk Observability Cloud home page. You can only remove a navigator when you’re in the Infrastructure Monitoring landing page view.
On an inactive navigator, select Remove Navigator.
Confirm your selection.