The All New Performance Insights for Splunk | Splunk (2024)

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, and even proactively address future problems. And since it is so good at those things, it’s not surprising that there are myriad tools to help you reflexively analyze your own Splunk deployment. For example, the Cloud Monitoring Console (CMC), available on Splunk Cloud, allows you to check the health of your deployment, observe ingest and search trends, and dive into details of the usage patterns.

But what does it mean if the CMC is telling you your ingest is steady and your system is healthy? How much more load can you put on your system before performance degrades below acceptable levels? What are the hourly patterns in your ingest or search load? What about daily, or monthly, or yearly patterns? What is happening on the system when you see degraded performance? These questions are difficult, if not impossible, to answer with the CMC alone. In many cases, users may resort to opening a tech support case with Splunk to answer them. What if there were a tool that could help you understand the performance characteristics of your particular deployment and tune your system to run optimally?

Well, there is! Performance Insights for Splunk (PI) was originally developed for internal use by Performance Engineers at Splunk, who needed a deeper understanding of how usage patterns are tied to system and resource usage. Recognizing the value that this tool provides for both Cloud and On Premise customers, it was added to Splunkbase for anyone to use.

This article is an introduction to the tool, giving a high-level overview of what it can do and how you can use it to ensure your system is not only running smoothly, but optimally as well. We’re often tempted, when we see performance issues, to assume that more hardware will solve the problem. While this is often true, it might not be the most cost effective solution. PI is meant to help you identify realized or potential performance issues, understand what parts of the system are involved, and monitor your environment after taking corrective steps.

As examples, some of the issues we might see are:

  • Skipped scheduled searches,
  • Search runtimes that are slower than expected, and
  • Higher than normal error rates.

If you were working inside the CMC alone, and you saw any one of these issues, you would find it difficult to relate any of them to each other or any other events that might have been happening at the same time. The CMC is great for health checks, but not as good for diagnostics; the pages’ layouts are to provide health information for a particular area, with their own groupings and time scales. If you know what you’re looking for, you might be able to find the information in there, but it’s not likely to jump out at you.

The All New Performance Insights for Splunk | Splunk (1)
The All New Performance Insights for Splunk | Splunk (2)

Figures 1 and 2: CMC pages using very different, often using time periods that are not customizable

PI helps by allowing you to set the same time scale and granularity on every page, for every chart. For example, when trying to see why the CPUs are spiking every 5 minutes, you’ll be able to see that scheduled search counts are also higher at those times, as is search concurrency. You’ll be able to see which searches were triggered 12 times in that hour and how much CPU those searches used.

The All New Performance Insights for Splunk | Splunk (3)
The All New Performance Insights for Splunk | Splunk (4)
The All New Performance Insights for Splunk | Splunk (5)

Figures 3, 4, and 5: No matter which page, Performance Insights for Splunk can display the same time range and granularity

At the top of every page you’ll find the time range and granularity pickers, for zooming in or out on the data. You’ll also find the cluster selector that allows you to filter relevant charts to metrics from the current search head cluster (or search head, if not clustered), or all search head clusters.

The All New Performance Insights for Splunk | Splunk (6)

Figure 6: Time pickers are specific to a page but can be set to the same values on every page.

The Performance Trend page gives an overview of ingest rates and search load, as well as indexer and search head CPU and memory metrics. This is where you can get a high level view of the general system performance over time.

The All New Performance Insights for Splunk | Splunk (7)

Figure 7: Performance Trends

The System Environment and Data page provides details of the deployment landscape and installed applications, along with statistics about the distribution of ingest on indexers, indexes, and source types. Knowing how your data is distributed will help you build more efficient searches. You might also choose to filter or redistribute the data to reduce index sizes.

The All New Performance Insights for Splunk | Splunk (8)

Figure 8: System Environment and Data

The Search Metrics page is broken into 6 parts: an overview page, and 5 search-type-specific pages. The overview page shows the collective view of all search activity, including concurrency, runtimes, and counts. Here you can check for seasonality in your searches, showing you how to flatten that load. The search-type-specific pages break down the details of each search type, including detailed runtime statistics, resource usage, skipped search details, and long-running search details. These pages can show you which searches to tune first to get better performance from your system.

The All New Performance Insights for Splunk | Splunk (9)The All New Performance Insights for Splunk | Splunk (10)

Figures 9 and 10: Search Overview and Details

The Resource Monitoring page outlines CPU and memory statistics for the search heads and indexers, along with search head restarts. This is likely the starting point whenever you are experiencing sub-optimal performance. Resource contention, especially CPU, is very often at the heart of performance related issues. If you see exhausted resources here, use the other pages to help tune and optimize to lower the burden on that resource.

The All New Performance Insights for Splunk | Splunk (11)

Figure 11: Resource Monitoring

The Splunk Features page gives insight into cache, smart store, data model and bucket statistics, along with information about assets and identities and notable events for Enterprise Security details.

The All New Performance Insights for Splunk | Splunk (12)

Figure 12: Splunk Features

And finally, the Environment Diagnose page exposes the error rates and error details for indexers and search heads. Seeing what errors were happening at the time of an issue is often key to solving the issue. Even if you're not experiencing any performance problems, minimizing warnings and errors on your system is generally a good practice, and can save you some system resources.

The All New Performance Insights for Splunk | Splunk (13)

Figure 13: Error Trends and Reporting

Armed with these views into your Splunk deployment, correlating an observed behaviour with other events that were happening at the same time is made easy. PI will not only help you diagnose issues with your system more quickly, but also allow you to find the best adjustments to make to reduce resource contention, allowing you to do more with the same amount of hardware. This can lead to significant savings in the long run. This brief overview of Performance Insights for Splunk just scratches the surface of what you can do with the tool. In future posts, I will walk through case studies showing how particular problems are solved with this tool, and how you can unlock its potential to get the most out of your Splunk system. So let's get started! Visit Splunkbase and install Performance Insights for Splunk today!

The All New Performance Insights for Splunk | Splunk (14)

Paul van der Eerden

Paul van der Eerden is a performance, scalability, and reliability engineer at Splunk and has been working in the field of software performance for over 20 years. His expertise at Splunk includes Splunk Enterprise, Splunk Enterprise Cloud, and Enterprise Security, focussing on optimizing resource usage and enhancing customer experience through improved responsiveness.

The All New Performance Insights for Splunk | Splunk (2024)

FAQs

What is the latest Splunk version? ›

Splunk
ReleaseReleasedLatest
9.23 months and 1 week ago (31 Jan 2024)9.2.1 (27 Mar 2024)
9.110 months ago (28 Jun 2023)9.1.4 (27 Mar 2024)
9.01 year and 11 months ago (14 Jun 2022)9.0.9 (27 Mar 2024)
8.22 years and 12 months ago (12 May 2021)8.2.12 (30 Aug 2023)
7 more rows
Mar 28, 2024

What are the Splunk components? ›

Splunk Components. The primary components in the Splunk architecture are the forwarder, the indexer, and the search head.

What is Splunk P3 support? ›

Splunk Asset and Risk Intelligence (ARI)
P3Any other case where a feature of purchased Splunk software is not operating as documentedTargeted Fix/ Workaround Times3
P4All general questions. Enhancement requests should be logged via the Splunk Ideas PortalAvailability1
Response Time
Update Time
13 more rows

What makes Splunk so good? ›

Splunk is highly scalable as it can ingest large amounts of data and process it quickly. Splunk is easy to implement as it can be deployed quickly and easily.

What is replacing Splunk? ›

Dynatrace. Dynatrace is a mature product that provides insights into your products/ services/applications that has the capability to trace the data, logging and capturing metrics for your business to achieve targeted SLO's.

Does NASA use Splunk? ›

A connection establishes a link between NASA and Splunk nodes (or vice versa) to route data through the workflow. A connection between two nodes passes data from one node's output to another node's input. Each node can have one or multiple connections.

What are the 4 types of searches in Splunk by performance? ›

How search types affect Splunk Enterprise performance
Search typeRef. indexer throughputPerformance impact
DenseUp to 50,000 matching events per second.CPU-bound
SparseUp to 5,000 matching events per second.CPU-bound
Super-sparseUp to 2 seconds per index bucket.I/O bound
RareFrom 10 to 50 index buckets per second.I/O bound

What are Splunk unique features? ›

Splunk APM Features
  • Use All Your Data. NoSample Full-fidelity trace ingestion. ...
  • Make Sense of Your Data in Seconds. AI-Driven Directed Troubleshooting. ...
  • Free Your Code. Open, flexible instrumentation. ...
  • Certifications. Industry certified, customer trusted. ...
  • Splunk Training. ...
  • Support and Services.

What are the versions of Splunk? ›

Splunk Enterprise version 9.x
Splunk EnterpriseSplunk Enterprise Security (ES)
9.2.07.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1, 7.3.2
9.1.47.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1
9.1.37.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1
9.1.27.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1
14 more rows

How to improve Splunk performance? ›

Use filtering commands before calculating commands

Use filtering commands, such as where , before commands that perform calculations, such as eval . For example, this search has a where command after the eval command. The search does not require the results of the eval command before the where command is run.

Does the military use Splunk? ›

Splunk is pleased to support the DoD's missions with IL5 and ESI contracting.

What is DSP in Splunk? ›

The Splunk Data Stream Processor (DSP) is a data stream processing service that manipulates data in real time and shoots that data over to your preferred platform.

Who competes with Splunk? ›

Competitors and Alternatives to Splunk
  • IBM.
  • LogRhythm.
  • Elastic.
  • SolarWinds.
  • Microsoft.
  • Google.
  • AT&T Cybersecurity.
  • Datadog.

What is better than Splunk? ›

Logtail is a ClickHouse-powered log management and analysis tool that offers sophisticated data collection, processing and reporting features. It is an excellent Splunk alternative that provides tools for collecting data across your entire stack and centralizing them in one place.

What not to use Splunk for? ›

Customer may not access or use the Splunk Service in connection with the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other similarly hazardous situations in a manner that if the Splunk Service were to fail it ...

When was Splunk 8.0 released? ›

Japanese language technical support for Splunk Cloud Platform
VersionRelease DateEnd of Support Date
8.0Oct 22 2019Oct 22 2021
8.1*****Oct 19 2020Apr 19 2023
8.2******May 12 2021Sep 30 2023
9.0Jun 14 2022Jun 14 2024
13 more rows

How to upgrade Splunk 7 to 8? ›

In terms of steps:
  1. Test your apps and make sure they are compatible with 8.0 (you need to go to Splunk base and check if they are compatible)
  2. Upgrade Deployment Server (disable it first, then upgrade, do not restart it yet)
  3. Upgrade Search Heads.
Jan 23, 2020

What does the latest do in Splunk? ›

Specifies the latest time in the _time field for the time range of your search. If you don't specify latest , now() is used as the default value.

Is there still a free version of Splunk? ›

Splunk Free is for standalone, single-instance use only installations. Most Splunk Enterprise features are available on the Free license, with the following exceptions: Ingest actions is not available. Alerting (monitoring) is not available.

Top Articles
Latest Posts
Article information

Author: Edwin Metz

Last Updated:

Views: 6046

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.