Splunk IT Service Intelligence

Servers are missing in Sourcetype=cpu & source=vmstat

Pooja1
Loves-to-Learn Everything

We could see only 10 hosts in index=os sourcetype=cpu & index=os source=vmstat. We should get all the unix/linux hosts on the mentioned sourcetype & source. We are using this to generate high cpu utilization, High memory utilization incidents.

Like till August end we are able to see 100+ host for the mentioned source and sourcetype but after August we are not able to see 100+ host like we could see only 10.15,7 

Please help me on this

Labels (1)
0 Karma

renjith_nair
Legend

Few preliminary things to check

  • Are the missing machine still up & running and part of your network?
  • Is Splunk still running on those missing machines?
  • Are the forwarders still able to connect to the indexers?
  • Is the *nix apps (or whichever apps used ) are installed and configured?
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

lperini_splunk
Splunk Employee
Splunk Employee

Splunk documentation has a page that guides customers to troubleshoot similiar issues as you described, like when they don't find the data/events.  

"Are you searching for events and not finding them, or looking at a dashboard and seeing "No result data"? Here are a few common mistakes to check."

https://docs.splunk.com/Documentation/Splunk/9.1.2/Troubleshooting/Cantfinddata

 

 

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...