Splunk Search

hosts event log lost behind a splunk forwarder

warmup031
Explorer

Hello,

We have had a forwarder that has its disk full several times in a weekend, So some hosts were not able to send their logs to this forwarder while splunk forwarder disk was full. how to list hosts (and know period for each host that sent no logs while this period. there are +100 hosts behind this forwarder, so a host=xxx | timechart count by host would not be efficient.

Thank you for your help

Tags (1)
0 Karma

warmup031
Explorer

Hello Giuseppe,

Many thanks for your reply. But is it possible (with "stats count" or timechart with span=1h), to get hosts with the less events or with zero events with span=1h for a day received by the forwarder ?

Thank you

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @warmup031,
using timechart, I think, it's the only way to highlight the periods when an host didn't send its logs,
I understand that if you have more than 100 hosts it's difficoult to read this diagram.
Eventually you could monitor disk space tracing the periods when it's 100%: they are the periods when you lost hosts's logs.

But maybe you could have a different approach creating an alert that warns you when the disk space on the forwarder is less than what is expected for the weekend (you surely be able to predict the needed disk space on Forwarder during week-end).

Ciao.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...