- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
I'd like to implement some basic searches for server and OS monitoring without getting caught up in the differences between sourcetypes and field names.
I already implemented the Splunk Add-on for Microsoft Windows and the Splunk Add-on Unix and Linux but I find that enumerating each sourcetype and coalescing the common fields is feeling unnecessarily complicated.
Are there any basic searches that provide server and OS monitoring without me having to deal with the complexities of the sourcetype differences? Something akin to the Performance Model of the Common Information Model, perhaps?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
The answer for this question has been distributed to the following posts:
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
The answer for this question has been distributed to the following posts:
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
Replaced the answer with its new homes.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
Updated "Storage Free" search to display by different mount/disks.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
Added a section about Alerts and incoming link What are the best event-data inputs for basic server and os monitoring?.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![SplunkTrust SplunkTrust](/html/@E48BE65924041B382F8C3220FF058B38/rank_icons/splunk-trust-16.png)
Does the existence of the Splunk App for Infrastructure change any of your recommendations?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
![sloshburch sloshburch](https://community.splunk.com/legacyfs/online/avatars/112472.jpg)
![Splunk Employee Splunk Employee](/html/@F88B7774A2BF2E9108D79A067A92A581/rank_icons/employee-16.png)
@gjanders - You're spot on. That's the intent of the "Future" section here. We'll eventually update this for the metrics and Splunk App for Infrastructure which is quickly becoming a game changer in this domain.
![](/skins/images/5D2DD17C284106BFBF80528D01D8AA1A/responsive_peak/images/icon_anonymous_message.png)