icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

Thank You

Downloading Splunk App for Hyperledger Fabric
SHA256 checksum (splunk-app-for-hyperledger-fabric_110.tgz) 915f2dbad87091a0e404f9b0798b601b0636b83d1c527170931724dd8b367dcf SHA256 checksum (splunk-app-for-hyperledger-fabric_101.tgz) 2c0385dd670f439a34df3c4722baebff020aee779d300c3110e3aac582e6e119
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Splunk App for Hyperledger Fabric

Splunk Built
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
The Splunk App for Hyperledger Fabric contains a set of dashboards and analytics to give you full visibility into the system metrics, application data and ledger so that you can maintain security, stability and performance for your Hyperledger Fabric deployment.

You can contact us with questions at blockchain [at] splunk dot com

Splunk App for Hyperledger Fabric

Overview Video

The Splunk App for Hyperledger Fabric contains a set of dashboards and analytics to give you full visibility into the system metrics, application data and ledger so that you can maintain security, stability and performance for your Hyperledger Fabric deployment.

These dashboards are meant to be a starting point for building analytics around your environment whether your infrastructure is virtual or physical, on-premise or in the cloud.

In order to take full advantage of the dashboards provided there are 4 types of data sources that should be configured.

  1. Hyperledger Fabric Distributed Ledger - These logs contain transaction information from the ledger itself and provide insight into operations and actions on-chain. We’ve open sourced our Splunk Connect for Hyperledger Fabric to help you easily ingest Hyperledger Fabric ledgers in Splunk.
  2. Hyperledger Fabric Application Logs - Application logs provide information about specific Hyperledger components such as the Orderers, Peer Nodes and other services (CouchDB and Kafka) useful for troubleshooting, debugging and monitoring application performance.
  3. Hyperledger Fabric Metrics (v1.4 and above) - These are metrics specific to Hyperledger Fabric components and performance. You can find a reference on these metrics here.
  4. Infrastructure/System Level Metrics and Logs - System metrics such as CPU, MEM, DISK and NETWORK activity provide insight into the underlying infrastructure Hyperledger Fabric nodes are running on. These metrics/logs could come from physical machines, Docker, Kubernetes, IBM IKS, Microsoft Azure, Google’s GCP and AWS Cloudwatch to name a few. Splunk has different Add-ons and connectors for each.

App Features


There are a few dashboards provided to get you started with analyzing your Hyperledger Fabric deployment. These include:

  • Data Setup - A dashboard to ensure that your Splunk environment is receiving all the data the application requires.
  • Network Architecture and Channels - See at a glance the number of orderers, peers, and channels in your Hyperledger Fabric network.
  • Infrastructure Health and Monitoring - An overview of system health from system metrics like CPU, uptime status as well as transaction latency. You can see in real time when transactions are starting to back up or a peer is falling behind on blocks.
  • Transaction Analytics - Real time visibility into the transactions being written on each ledger. In this dashboard, we’re blending ledger data sent from the peers with logs and metrics to give a holistic view of the network’s health.

Network Architecture and Channels
Infrastructure Health and Monitoring
Transaction Analytics

Field Extractions and Aliases

The app provides a number of field extractions and aliases that will make searching and investigating Hyperledger Fabric data easier. These include parsing couchdb logs for actions (GET, PUT, POST, etc) and documents, chaincode logs for channel and latency metadata, and field aliases for accessing various parts of ledger transactions. To see the full list you can look at the props.conf file or go to Settings > Fields in Splunk.

Getting Started

  1. Install the App on a Splunk Enterprise Search Head that will have access to the data.
  2. Open the App and navigate to the “Data Setup” dashboard from the Introduction Page.
  3. Follow the instructions for each of the 4 data sources on the “Data Setup” page in order to populate the graphs and validate data is coming in correctly.

    • Hyperledger Fabric Ledger Logs - The Splunk Connect for Hyperledger Fabric is an open source agent that connects to a peer on the Hyperledger Fabric network. See the README on Github here for deployment instructions. Docker, Kubernetes, and native deployments are all options.
    • Hyperledger Fabric Application Logs - There are several options to get data in from you Hyperledger Fabric environment depending on where and how the nodes are hosted. You will need to create an index in Splunk as well as an input mechanism to receive the data. We usually like to create an index called “hyperledger_logs” and “hyperledger_metrics” and enable the Splunk HEC to receive data. You can use the example “indexes.conf.example” provided in the app. Simply rename the file from “indexes.conf.example” to “indexes.conf” to enable the indexes, and rename “inputs.conf.example” to “inputs.conf” to enable the HEC endpoints. You will also need to enable the HTTP Event Collector (HEC) to receive data if it has not been "enabled" already.
    $ cd $SPLUNK_HOME/etc/apps/splunk-hyperledger-fabric/default
    $ sudo mv inputs.conf.example inputs.conf
    $ sudo mv indexes.conf.example indexes.conf
    $ cd /opt/splunk/bin
    $ sudo ./splunk restart

Supported Log Ingestion Methods

Also make sure to set the following environment variable in your Hyperledger Fabric environments:


Hyperledger Fabric Metrics (v1.4 and above)

Hyperledger Fabric 1.4 exposes metrics for ingestion using StatsD. You can setup Splunk to ingest from StatsD.

  • Create a UDP data input following these directions OR use the example “inputs.conf.example” provided in the app. Simple rename the file from “inputs.conf.example” to “inputs.conf” and restart Splunk.
  • Now set the following environment variables in your Hyperledger Fabric environment.
  • Open the Metrics Workspace to explore and analyze your metrics.

  • System Logs/Metrics - Depending on how you’ve deployed your Hyperledger Fabric network, there is probably a great option to get your System Logs and Metrics for end-to-end visibility. On the data setup dashboard, we’ve provided a list of common options that you can use to get your data into Splunk.

You are now ready to use the Splunk App for Hyperledger Fabric!

Release Notes

Version 1.1.0
April 20, 2020

New Features:
- New Chaincode events dashboard
- New metrics on Infrastructure Health dashboard for RAFT ordering
- New K8s monitoring dashboard for data coming in from Splunk Connect for Kubernetes
- Easier data setup through updated macros and searches for Kubernetes environments

Bug Fixes:
- dashboard fixes to work with v1.4.6 data changes such as committed block regular expression
- squashed some general search bugs
- commented out Kafka and Zookeeper panels in network architecture dashboard so they still can be used for Kafka based deployments
- fixed latency searches on infra monitoring dashboard
- fixed hardcoded Certificate Authority panel/search on network architecture dashboard
- updated searches/macros on data setup page to be more flexible regarding docker/k8s deployments

Version 1.0.1
July 29, 2019


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.