All Apps and Add-ons

Why don't the dashboards in the Splunk App for Stream get populated with data?

jbrodsky_splunk
Splunk Employee
Splunk Employee

Why don't the default dashboards in the Splunk App for Stream get populated with data? Why can't I assign a forwarder to a group within the Distributed Management capability in the Stream app?

Tags (2)
1 Solution

jbrodsky_splunk
Splunk Employee
Splunk Employee

You may notice that the Splunk App for Stream has a number of dashboards to allow you to monitor your Stream environment. Also, in version 6.3 we added the "distributed forwarder management" feature that allows different Stream forwarders to monitor different protocols.

In order for these two features to work, your remote Universal Forwarders (UF) must have a modification to their outputs.conf, so that they can write directly to the _internal index with your Splunk environment. This is actually documented here:

http://docs.splunk.com/Documentation/StreamApp/6.3.0/DeployStreamApp/Deploymentrequirements#Splunk_c...

When you do this, the stream:stats sourcetype will populate data into _internal, and these two features will work.

View solution in original post

jbrodsky_splunk
Splunk Employee
Splunk Employee

You may notice that the Splunk App for Stream has a number of dashboards to allow you to monitor your Stream environment. Also, in version 6.3 we added the "distributed forwarder management" feature that allows different Stream forwarders to monitor different protocols.

In order for these two features to work, your remote Universal Forwarders (UF) must have a modification to their outputs.conf, so that they can write directly to the _internal index with your Splunk environment. This is actually documented here:

http://docs.splunk.com/Documentation/StreamApp/6.3.0/DeployStreamApp/Deploymentrequirements#Splunk_c...

When you do this, the stream:stats sourcetype will populate data into _internal, and these two features will work.

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...