All Apps and Add-ons

Indexes are being populated with data, but why is the Splunk App for Cisco UCS not displaying data?

ebailey
Communicator

I have installed the Splunk App for UCS and I can see data being collecting by the HF and the indexes are being populated with data from the scripted input and syslog from the UCS instance. My issue is that the app is not displaying any data. Do I need to wait for data to be ready for display? Any troubleshooting tips?

Thanks!

0 Karma

halr9000
Motivator

No, it should not take long for data to show up. Have a look at the below, and if you've got some helpful error messages, let us know.

This is all from the README in the main app root folder:

TEST YOUR INSTALL

The main app dashboard can take some time before the data is returned which will populate some of the panels. A good test to see that you are receiving all of the data we expect is to run this search after several minutes:

index="cisco_ucs*" | stats count by sourcetype

In particular, you should see these sourcetypes:
* ciscoucs:ucsm:fault
* ciscoucs:ucsm:inventory
* ciscoucs:ucsm:perf

If you have configured UCS to send syslog events into Splunk, you may also see:
* ciscoucs:syslog
* syslog

If you don't see these sourcetypes, have a look at the messages output by the scripted input: Collect.py. Here is a sample search that will show them:

index=_internal component="ExecProcessor" Collect.py | table _time host log_level message

(INFO log_level is good, WARN or ERROR are bad.)

0 Karma

ebailey
Communicator

I ran the tests you put in the readme and everything came back with data. The problem is that the UI is not presenting the data. I am going to break down the searches and maybe this is a path issue or something.

0 Karma

ebailey
Communicator

I am wondering if something is wrong with the data.

The query for inventory summary is

eventtype=ucs-inv | eval fqdn=ucs+":"+dn | dedup fqdn sortby +_Time | append [search eventtype=ucs-perf class=topSystem | dedup name] | lookup classDescription class OUTPUT description as classDescr | fields *

The search returns no data but if I remove everything back to the eventtype - I get the following

ys/switch-B/slot-3|Cisco Systems, Inc.|16|operable|N/A|0|unknown|FOC17413PKQ|unknown|equipped|2015-02-09T11:46:31.664|UCS-FI-E16UP|operable|unknown|3|online|0|O2 16 port flexible GEM|online

It looks like the eval is breaking down. Is this the right data for eventtype ucs-inv?

0 Karma

halr9000
Motivator

Try a search for "eventtype=ucs-inv BD_SPLUNK". We want that to return zero results. Also, inspecting the above, it looks like there is some truncation. Was that a paste error, or is that how it looks?

You are seeing one of two problems which I am aware some are seeing. Hopefully we can figure out which one.

What Splunk version? UCS Manager version?

0 Karma

ebailey
Communicator

The search returned 111 results over 60 minutes.

That is how the data looks in Splunk. Splunk 6.1.2 I am getting the version of the UCSM.

0 Karma

ebailey
Communicator

ucsm version 2.2.3b

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...