Splunk ITSI

Servers are missing in Sourcetype=cpu & source=vmstat

Pooja1
Loves-to-Learn Everything

We could see only 10 hosts in index=os sourcetype=cpu & index=os source=vmstat. We should get all the unix/linux hosts on the mentioned sourcetype & source. We are using this to generate high cpu utilization, High memory utilization incidents.

Like till August end we are able to see 100+ host for the mentioned source and sourcetype but after August we are not able to see 100+ host like we could see only 10.15,7 

Please help me on this

0 Karma

renjith_nair
Legend

Few preliminary things to check

  • Are the missing machine still up & running and part of your network?
  • Is Splunk still running on those missing machines?
  • Are the forwarders still able to connect to the indexers?
  • Is the *nix apps (or whichever apps used ) are installed and configured?
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

lperini_splunk
Splunk Employee
Splunk Employee

Splunk documentation has a page that guides customers to troubleshoot similiar issues as you described, like when they don't find the data/events.  

"Are you searching for events and not finding them, or looking at a dashboard and seeing "No result data"? Here are a few common mistakes to check."

https://docs.splunk.com/Documentation/Splunk/9.1.2/Troubleshooting/Cantfinddata

 

 

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...