This input will return the average percentage of cpu used within the specified interval. This is one of the “Dashboard Stats” inputs – more information on these can be found here: Mulesoft documentation – Dashboard stats Splunk events Sourcetype: mulesoft:stats:cpu Timestamp: timestamp provided by Mulesoft Sample event: {“id”: “i-0ae7f829cc48fc7db”, “ipAddress”: “18.216.111.13”, “timestamp”: “1622113440000”, “cpu”: 1.3583333333333332, “domain”:…
Read MoreGlossary Index
Definitions of key terms, and information on the inputs where they are required, can be found from the following list:
Read MoreDeployments
This input returns information on the deployment of each (application) in a given . Events contain information on deploymentIds and domains within the environment, as well as instanceIds and status for each worker in that domain. Splunk events Sourcetype: mulesoft:deployments Timestamp: time that the data was received by Splunk Sample event: {“deploymentId”: “60af77a566408611ac84277a”, “createTime”: “2021-05-27T10:42:45.951Z”,…
Read MoreInputs Index
Detailed information on each individual input, including sample events and links to Mulesoft documentation, is provided via the list below.
Read MoreTOC
CloudHub Add-on Docs
Read MoreTroubleshooting
Checking Logs If the inputs are not generating the data that you are expecting to see, there are a couple of troubleshooting measures that you can try to diagnose any issues. Run the following search to check for any error messages that have been generated that relate to MuleSoft: index=_internal WARN OR ERROR mulesoft source=”/opt/splunk/var/log/splunk/splunkd.log”…
Read MoreUsing the Discovery input
Setting up the ‘Discovery’ input is a convenient way to get information about your Cloudhub environments in Splunk. Most of the data inputs that can be created in the app require at least one of or to be supplied. We have created a “” input that takes in a set of MuleSoft credentials and returns…
Read MoreSetting up the Cloudhub Add-on
Download and install the add-on in your Splunk environment, and navigate to the app. Ensure that you have created an index for this data. From the Configuration screen click ‘Add’ and then choose a name and enter your credentials. Note: Credentials can be either a username/password combination OR client_id/client_secret from a connected app. Any…
Read More
You must be logged in to post a comment.