<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best Practices to Measure Performance improvement after Splunk Migration. in Monitoring Splunk</title>
    <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274903#M2592</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We are moving a 3 tier clustered splunk env from an on prem environment to a cloud instance - where we have been told we will be getting much better performance all round.&lt;BR /&gt;
My question is how do we measure this ? what KPI's should we be measuring before and after the migration and what would be the best way ?&lt;BR /&gt;
My initial thoughts are disk IO, search response, mem. cpu usage  etc.&lt;/P&gt;

&lt;P&gt;Any recommendations gratefully received.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jul 2016 05:40:22 GMT</pubDate>
    <dc:creator>Esky73</dc:creator>
    <dc:date>2016-07-20T05:40:22Z</dc:date>
    <item>
      <title>Best Practices to Measure Performance improvement after Splunk Migration.</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274903#M2592</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We are moving a 3 tier clustered splunk env from an on prem environment to a cloud instance - where we have been told we will be getting much better performance all round.&lt;BR /&gt;
My question is how do we measure this ? what KPI's should we be measuring before and after the migration and what would be the best way ?&lt;BR /&gt;
My initial thoughts are disk IO, search response, mem. cpu usage  etc.&lt;/P&gt;

&lt;P&gt;Any recommendations gratefully received.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 05:40:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274903#M2592</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2016-07-20T05:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices to Measure Performance improvement after Splunk Migration.</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274904#M2593</link>
      <description>&lt;P&gt;I dont see disk i/o / mem / cpu usage as good KPIs. Mainly because in a cloud environment, these should be watched by the SaaS provider. However, on premise, yes these are good metrics, but again its hard to compare these to SaaS.. { different types of storage and compute tiers.. }&lt;/P&gt;

&lt;P&gt;You're better metrics would be to watch:&lt;/P&gt;

&lt;P&gt;1) Search performance, get a baseline of your onprem searches vs what they run in your cloud&lt;BR /&gt;
2) Index vs ingest times (latency)&lt;BR /&gt;
3) Queues... Backed up indexing queues would represent potential I/o bottlenecks, typing queues, parsing etc for related Splunk bottlenecks&lt;BR /&gt;
4) Skipped / Deferred searches  &lt;/P&gt;

&lt;P&gt;Those are a few major indicators to look out for and compare between instances.. Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 08:43:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274904#M2593</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2016-07-20T08:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices to Measure Performance improvement after Splunk Migration.</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274905#M2594</link>
      <description>&lt;P&gt;I agree, use some of the dashboards / searches built into the DMC (Distributed Management Console) to give you some info on Searches, Index Pipelines, Etc.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 10:21:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274905#M2594</guid>
      <dc:creator>hmclaren_splunk</dc:creator>
      <dc:date>2016-07-20T10:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices to Measure Performance improvement after Splunk Migration.</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274906#M2595</link>
      <description>&lt;P&gt;Run 4 searches on each system and use the &lt;CODE&gt;Job Inspector&lt;/CODE&gt; from the &lt;CODE&gt;Job&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;Inspect job&lt;/CODE&gt; to examine how long each step took and the overall response time.  Run these:&lt;/P&gt;

&lt;P&gt;1:  A long search like for &lt;CODE&gt;Last 2 years&lt;/CODE&gt;, that uses something complicated like &lt;CODE&gt;|timechart span=1mon avg(_time) AS junk&lt;/CODE&gt;,&lt;BR /&gt;
2:  A short search like for &lt;CODE&gt;Last 24 hours&lt;/CODE&gt;, that uses something complicated like &lt;CODE&gt;|timechart span=1h avg(_time) AS junk&lt;/CODE&gt;.&lt;BR /&gt;
3:  A long search, like for &lt;CODE&gt;Last 2 years&lt;/CODE&gt;, that uses something easy and reduceable like &lt;CODE&gt;dedup host&lt;/CODE&gt;.&lt;BR /&gt;
4:  A short search, like for &lt;CODE&gt;Last 24 hours&lt;/CODE&gt;, that uses something easy and reduceable like &lt;CODE&gt;dedup host&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Also, you chould use DMC to see what your "worst" search is and run that both places.  You obviously have some idea of what "isn't working" so just run that both places and compare the &lt;CODE&gt;Job Inspector&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 15:36:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274906#M2595</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-20T15:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices to Measure Performance improvement after Splunk Migration.</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274907#M2596</link>
      <description>&lt;P&gt;Hi I cannot find "worst search" within DMC - any pointers ?&lt;/P&gt;

&lt;P&gt;DMC only appears on the indexers and the Long-running searches have No results found.&lt;/P&gt;

&lt;P&gt;there is no DMC on the SH cluster&lt;/P&gt;

&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 06:44:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Best-Practices-to-Measure-Performance-improvement-after-Splunk/m-p/274907#M2596</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2016-08-03T06:44:41Z</dc:date>
    </item>
  </channel>
</rss>

