Monitoring Splunk

Monitor Concurrent Searches

aferone
Builder

Every once in a while, we will get this message, and I understand it.

I would like to run a periodic search, add it to a summary index, and chart against it so that I can see when it happens historically.

I have read through some of the answers here, but I am wondering if there is just a Splunk search that will spit out the number of concurrent searches happening at that time. Does that exist? Since the error shows a number, I am assuming it is possible?

Thanks!

alt text

Tags (1)
0 Karma

somesoni2
Revered Legend

Try something like this

index=_internal sourcetype=splunkd source=*metrics.log group=search_concurrency "system total" 
        | timechart max(active_hist_searches) as "Historical Searches" min(active_realtime_searches) as "Real-time Searches" by host
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...