Module 2 - Monitoring Splunk Flashcards
Content to monitor in MC
Search
Indexing
Resources
Forwarders
Instances
Configure MC in standalone mode
Setting > general setup
Select mode: Standalone
Apply changes
MC in Distributed Mode
Recommended on its own system
Same requirements as search head
MC on shared instance
With License Manager
With deployment server (50< clients)
With indexer cluster Manager node
Adding Splunk Instances to the MC
Repeat for each Search Head, Deployment Server, License Manager, and non-clustered Indexer
Settings > distributed search > Search peers > New peer >Save
DO NOT add clustered indexers
MC Alerts
Disabled by default
Settings > Alert Setup
MC Health Check
Series of ad hoc searches that run sequentially:
Monitoring Console > Health Check
Splunk Assist
Cloud connected service
Insights in real time
Leverages Telemetry data
Splunk diag
./splunk diag
Collects server specs: configure, os, file system and open current connections
Collect splunk platform data: Contents of SPLUNK_HOME/etc such as app configurations, Splunk log files, and index metadata
Creates tar.gz file and diag.log
Does not retrieve customer or index data
Diagnostics in Splunk web
Instrumentation Settings > System > Instrumentation
RapidDiag - directly uploads to splunk support (Only Linux)