Splunk Search

Show top sources for splunk failing

charlestips
Explorer

I am trying to compile a report of the devices that send the most data to splunk minus our firewalls as they are obviously very chatty. I put together the following search

sourcetype!=cisco_firewall | top host showperc=false

That way it would exclude the firewalls from the results however even if I set this to the last 15 minutes it times out and does not complete. Am I doing something wrong?

Tags (2)
0 Karma
1 Solution

yannK
Splunk Employee
Splunk Employee

Your search will display the number of event for each host, not really the volume.
this is one of the most costly search you can make...

You can use the metadata to have the same result faster :


| metadata type=hosts sourcetype!=cisco_firewall | table host totalCount | sort -totalCount

If you want to measure the volume of data send by host, you can search the _internal metrics. But you won't be able to filter per sourcetype.


index=_internal group="per_host_thruput" | eval mb=kb/1024| timechart span=1d sum(mb) by series | top 10 series

look at this page to find other cool searches :
http://www.splunk.com/wiki/Community:TroubleshootingIndexedDataVolume

View solution in original post

charlestips
Explorer

Oddly enough neither of those two searches work for me.

When I do a search for the first string my result is "no matching fields exist"

When I search on the second string I immediately get a return with 0 results.

0 Karma

yannK
Splunk Employee
Splunk Employee

You need to have permissions to search on the metadata and the _internal indexes. At least the Admin role can.

0 Karma

yannK
Splunk Employee
Splunk Employee

Your search will display the number of event for each host, not really the volume.
this is one of the most costly search you can make...

You can use the metadata to have the same result faster :


| metadata type=hosts sourcetype!=cisco_firewall | table host totalCount | sort -totalCount

If you want to measure the volume of data send by host, you can search the _internal metrics. But you won't be able to filter per sourcetype.


index=_internal group="per_host_thruput" | eval mb=kb/1024| timechart span=1d sum(mb) by series | top 10 series

look at this page to find other cool searches :
http://www.splunk.com/wiki/Community:TroubleshootingIndexedDataVolume

Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...