Hey guys, my el basically tells me that we're going to be deep diving on the indexes in our env to extract some usage data and optimize some of the intake. We will mostly be in the search app, writing queries to pull this info. Usually in the audit index, trying to find what KO's/indexes/searches/etc are being used, whats not being used and just overall monitoring. any advice or tips on this?
This .conf24 presentation should have some useful information.
GitHub - TheWoodRanger/presentation-conf_24_audittrail_native_telemetry
Thank you brother! I'm checking it out as we speak
Know who is logging into what Splunk systems
You know what systems searches are being performed on.
What searches are being performed,
What commands are being used in a search (think spl key words such as search, lookup, join, append, mvcount, etc)
What sourcetypes, lookups, eventtypes, etc are being searched
What dashboards are being visited
etc
At a high level, the following searches can be start points for the information you're looking for.
1. Audit index queries: -
2. Knowledge Object (KO) usage:
3. Index usage:
4. Search performance:
5. Data intake:
You could also look at the Alerts for Splunk Admins app on Splunkbase which has a good bunch of searches baked in (https://splunkbase.splunk.com/app/3796)
Please let me know how you get on and consider upvoting/karma this answer if it has helped.
Regards
Will
Thanks! im a bit new to the splunk community forum. But if i accept this as the solution, will it prevent other users from still inputting advice?
other people will still be able to reply but the one accepted will be at the top to allow others to see it easily if they come across the same questions.
Thanks!
will
understood, so my el basicallly hands me an index today and tells me to investigate it. My anxiety is going through the roof. Please...and tips and advice and best practice?