I have installed the Splunk App for UCS and I can see data being collecting by the HF and the indexes are being populated with data from the scripted input and syslog from the UCS instance. My issue is that the app is not displaying any data. Do I need to wait for data to be ready for display? Any troubleshooting tips?
Thanks!
No, it should not take long for data to show up. Have a look at the below, and if you've got some helpful error messages, let us know.
This is all from the README in the main app root folder:
The main app dashboard can take some time before the data is returned which will populate some of the panels. A good test to see that you are receiving all of the data we expect is to run this search after several minutes:
index="cisco_ucs*" | stats count by sourcetype
In particular, you should see these sourcetypes:
* ciscoucs:ucsm:fault
* ciscoucs:ucsm:inventory
* ciscoucs:ucsm:perf
If you have configured UCS to send syslog events into Splunk, you may also see:
* ciscoucs:syslog
* syslog
If you don't see these sourcetypes, have a look at the messages output by the scripted input: Collect.py. Here is a sample search that will show them:
index=_internal component="ExecProcessor" Collect.py | table _time host log_level message
(INFO log_level is good, WARN or ERROR are bad.)
I ran the tests you put in the readme and everything came back with data. The problem is that the UI is not presenting the data. I am going to break down the searches and maybe this is a path issue or something.
I am wondering if something is wrong with the data.
The query for inventory summary is
eventtype=ucs-inv | eval fqdn=ucs+":"+dn | dedup fqdn sortby +_Time | append [search eventtype=ucs-perf class=topSystem | dedup name] | lookup classDescription class OUTPUT description as classDescr | fields *
The search returns no data but if I remove everything back to the eventtype - I get the following
ys/switch-B/slot-3|Cisco Systems, Inc.|16|operable|N/A|0|unknown|FOC17413PKQ|unknown|equipped|2015-02-09T11:46:31.664|UCS-FI-E16UP|operable|unknown|3|online|0|O2 16 port flexible GEM|online
It looks like the eval is breaking down. Is this the right data for eventtype ucs-inv?
Try a search for "eventtype=ucs-inv BD_SPLUNK". We want that to return zero results. Also, inspecting the above, it looks like there is some truncation. Was that a paste error, or is that how it looks?
You are seeing one of two problems which I am aware some are seeing. Hopefully we can figure out which one.
What Splunk version? UCS Manager version?
The search returned 111 results over 60 minutes.
That is how the data looks in Splunk. Splunk 6.1.2 I am getting the version of the UCSM.
ucsm version 2.2.3b