Splunk IT Service Intelligence

Servers are missing in Sourcetype=cpu & source=vmstat

Pooja1
Loves-to-Learn Everything

We could see only 10 hosts in index=os sourcetype=cpu & index=os source=vmstat. We should get all the unix/linux hosts on the mentioned sourcetype & source. We are using this to generate high cpu utilization, High memory utilization incidents.

Like till August end we are able to see 100+ host for the mentioned source and sourcetype but after August we are not able to see 100+ host like we could see only 10.15,7 

Please help me on this

Labels (1)
0 Karma

renjith_nair
Legend

Few preliminary things to check

  • Are the missing machine still up & running and part of your network?
  • Is Splunk still running on those missing machines?
  • Are the forwarders still able to connect to the indexers?
  • Is the *nix apps (or whichever apps used ) are installed and configured?
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

lperini_splunk
Splunk Employee
Splunk Employee

Splunk documentation has a page that guides customers to troubleshoot similiar issues as you described, like when they don't find the data/events.  

"Are you searching for events and not finding them, or looking at a dashboard and seeing "No result data"? Here are a few common mistakes to check."

https://docs.splunk.com/Documentation/Splunk/9.1.2/Troubleshooting/Cantfinddata

 

 

0 Karma
Get Updates on the Splunk Community!

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Dashboard Challenge and Watch the .conf24 Global Broadcast!

The Splunk Community Dashboard Challenge is still happening, and it's not too late to enter for the week of ...