Getting Data In

Index Health Monitor

gharpe2
Explorer

How can I proactively monitor my Splunk indexes to make sure they are still indexing? I have an SNMP monitoring application, is there a way to setup an SNMP alert/monitor so if Splunk stops indexing it sends me an alert?

Or, is there a way to do this directly within Splunk?

thanks, glh

Tags (1)

sideview
SplunkTrust
SplunkTrust

1) For a simple User Interface answer -- login as an admin user, go to the Search app, go to "Status", then to "Indexing Activity". it'll show things like recent indexing activity over time, and top sourcetypes

2) For a more complicated hands-on approach, again login as an admin, go to the Search app, to go "Views" , then to "Advanced Charting". Then run this search

index="_internal" source=*metrics.log* group="per_sourcetype_thruput" | timechart sum(kb) by series

(and you'll probably want to set the 'chart type' to 'line'. Or set it to 'column' and then set 'Stack mode' to 'stacked'. )

As far as the alerting/monitoring, with those search results in front of you, save that search as a saved search (Actions > Save Search), then click 'schedule options' to open up a bunch more fields. Among other things you can have it send out email, or have it run a script if/when a custom condition matches on the search results. So although Splunk doesnt have any specific SNMP, you can hook up a script that does.

0 Karma
Get Updates on the Splunk Community!

Digital Resilience Assessment Launch | How prepared are you for disruption?

Disruption is inevitable. The question is – how prepared are you to handle it? In today’s fast-moving digital ...

Buttercup Games: Further Dashboarding Techniques (Part 2)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Index This | What is the next number in the series? 7,645 5,764 4,576…

February 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...