Splunk Search

Splunk sizing: where is the search concurrency information?

cmeo
Contributor

I've been reviewing the information around sizing Splunk installations and it seems to distill--at its simplest--to two key dimensions: data volume and search concurrency. While historical data volumes are relatively easy to get, it seems to be a lot harder to assemble interactive search activity and saved search activity into some kind of picture of overall search concurrency over a time period.

Does anyone know where Splunk hides all the info you'd need to do this? A lot of the wiki entries seem to be out of date; SoS app gives this problem a good college try, but while the scheduled search stuff seems fine, it uses ps and investigates the command line for the interactive stuff which seems a bit random--surely this information is stored elsewhere in Splunk?

Anyway you need all these things (and more of course) to size Splunk properly, and it's fairly strange that you don't seem to be able to get this out of the box. Especially when nearly everyone uses pilot projects to arrive at real sizing...somehow!

Ledion_Bitincka
Splunk Employee
Splunk Employee

If you're using 6.x you can find that information in Activity (upper right hand corner) >> System Activity >> Search activity overview - or you can get to the raw data using the following search:

index=_internal source=*metrics.log group=search_concurrency "system total" NOT user=* 

cmeo
Contributor

found yet another variant:

| history | timechart span=1d count(search)

different again...so which one do I trust?

0 Karma

asimagu
Builder

did you try using dc(search) ?

0 Karma

Ledion_Bitincka
Splunk Employee
Splunk Employee

use/trust metrics.log

0 Karma

cmeo
Contributor

I need history as well as current activity. Trying these two searches at the moment:

index=_audit action=search info=granted search=* NOT "search_id='scheduler" NOT "search='|history" NOT "user=splunk-system-user" NOT "search='typeahead" NOT "search='| metadata type=* | search totalCount>0" | timechart span=1m count(search)

index=_internal source=*metrics.log group=search_concurrency "system total" NOT user=* | timechart span=1m count(_raw)

They are returning results that are different, the second giving counts very much larger than the first. Is there a canonical answer to this question? Unless there is, I'll go with the second and hope for the best...

0 Karma
Get Updates on the Splunk Community!

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...