icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Splunk Health Check Overview
SHA256 checksum (splunk-health-check-overview_221.tgz) 808a17714d8b33baffa434595d8bbbbfa8031730b8a179516275346aab0c0dca SHA256 checksum (splunk-health-check-overview_22.tgz) 0b26e3cebe7ca6d75b5a00c35d082f6ce5d733afa3aaf6f636294ca299721577 SHA256 checksum (splunk-health-check-overview_214.tgz) 5fd412924701163148f7224ba87a57c0bc0810b59c064d0a69c1cabf85088a9d SHA256 checksum (splunk-health-check-overview_213.tgz) 79808e161d0659a623b5a336e93914e2aa59d4cce21d3cb89ef603821f27ae89 SHA256 checksum (splunk-health-check-overview_212.tgz) 87ac433e63c3949d25c569823e8bd774faf2eac5d96bf0562b7406a519f55be3 SHA256 checksum (splunk-health-check-overview_211.tgz) 4e336ff5a3f2f29006b71b239788cf4f9e741c99743d583dab7acddc2d728c45 SHA256 checksum (splunk-health-check-overview_21.tgz) 096f16b8d25cf51f5881202dcff35b8ebe0e8198723d3bac7003ded627bb0d8e SHA256 checksum (splunk-health-check-overview_20.tgz) 9c2361e133be5fdfb278615bfd83967616ef5d020dba47f9049b18a80a853f69
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Splunk Health Check Overview

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The Splunk Health Overview app provides visibility into your deployment’s health through license usage, resource usage, server status, usage patterns, and search activity.

The Splunk Health Overview app helps you easily manage your Splunk environment and provides a high level overview of key metrics.

It features several helpful views:

Health Status
License Overview
Search Activity
Resource Usage
Scheduler Activity
User Activity
Available Indexes
Indexes and Fields

The Splunk Monitoring App Focuses on the following areas:

Health Status – status of your instances, forwarders, data feeds, and internal messages.
License Overview – shows the status of your license usage, license trending, and index and indexer capacity - takes advantage of the Internal Events data model.
Resource Usage - uses the Introspection Usage data model for a look into Splunk and system resource usage.
Search Activity – illustrates what users are searching in your environment and allows you to easily identify poorly written searches.
Scheduler Activity – information regarding job schedules.
User Activity – information regarding user activity.
Available Indexes – shows what indexes and source types are in your environment with a custom contextual drill down capability that launches a new search with the index/sourcetype in question defined. This has proven very successful as users no longer have to run expensive exploratory searches to determine what indexes and sourcetypes are available to their role.
Indexes and Fields - Contains detail regarding field extractions for sourcetypes and the fields that are extracted.

Getting Started:

Once the app is installed a restart is required. After the restart you will need to run two of the scheduled saved searches avail_indexes and all_servers. These two lookups will gather information regarding your environment and are crucial to the apps functionality. If the all_servers lookup does not generate accurate information in your environment you will need to manually edit this. For 6.1.x environments enable the server_lookup_v6_1 saved search and disable the default server_lookup saved search.

Other Gotchas:
There is an Internal Events and Introspection accelerated data model will will need to complete acceleration.

You can customized thresholds based on your license capacity. By default, the filler gauge is set to 10 GB.

Splunk instances running on Mac OSX do not generate Introspection data.

Each instance to be monitored will need to be a search peer so Splunk can collect the role information from that host. If it is not setup as a peer Splunk can still collect information regarding that host granted it is sending data to a host that is a Splunk search peer but will not show information generated from REST.

Currently only supported on Splunk 6.1+. To get this app functioning with 6.0.x you will need remove the panel tags from the xml views and remove any panel embedded time range picker as well as any multiselect inputs.

Special thanks to Sanford Owings and Vlad Skoryk.

Release Notes

Version 2.2.1
July 12, 2015

Updated issue with deployment status drop downs and updated license usage overview with host option.

Version 2.2
June 23, 2015
Version 2.1.4
Jan. 9, 2015

Updated Saved Search Detail page to illustrate unused or stale saved searches.

Version 2.1.3
Dec. 16, 2014
Version 2.1.2
Dec. 16, 2014
Version 2.1.1
Dec. 16, 2014
Version 2.1
Dec. 16, 2014
Version 2.0
Dec. 3, 2014

The Splunk Health Overview app helps you easily manage your Splunk environment and provides a high level overview of key metrics.

It features several helpful views:

Health Status
License Overview
Search Activity
Resource Usage
Scheduler Activity
User Activity
Available Indexes
Indexes and Fields

The Splunk Monitoring App Focuses on the following areas:

Health Status – status of your instances, forwarders, data feeds, and internal messages.
License Overview – shows the status of your license usage, license trending, and index and indexer capacity - takes advantage of the Internal Events data model.
Resource Usage - uses the Introspection Usage data model for a look into Splunk and system resource usage.
Search Activity – illustrates what users are searching in your environment and allows you to easily identify poorly written searches.
Scheduler Activity – information regarding job schedules.
User Activity – information regarding user activity.
Available Indexes – shows what indexes and source types are in your environment with a custom contextual drill down capability that launches a new search with the index/sourcetype in question defined. This has proven very successful as users no longer have to run expensive exploratory searches to determine what indexes and sourcetypes are available to their role.
Indexes and Fields - Contains detail regarding field extractions for sourcetypes and the fields that are extracted.

Getting Started:

Once the app is installed a restart is required. After the restart you will need to run two of the scheduled saved searches avail_indexes and all_servers. These two lookups will gather information regarding your environment and are crucial to the apps functionality. If the all_servers lookup does not generate accurate information in your environment you will need to manually edit this. For 6.1.x environments you will need to enable and run the server_lookup_v6_1 saved search and disable the server_lookup search.

Other Gotchas:
There is an Internal Events and Introspection accelerated data model will will need to complete acceleration.

You can customize thresholds based on your license capacity. By default, the filler gauge is set to 10 GB.

Splunk instances running on Mac OSX do not generate Introspection data.

Each instance to be monitored will need to be a search peer so Splunk can collect the role information from that host. If it is not setup as a peer Splunk can still collect information regarding that host granted it is sending data to a host that is a Splunk search peer but will not show information generated from REST.

Special thanks to Sanford Owings and Vlad Skoryk.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.