<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why am I seeing poor search performance for simple searches and high CPU on one core? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172278#M49369</link>
    <description>&lt;P&gt;I just found what was the problem...&lt;/P&gt;

&lt;P&gt;Found the issue to be with bloated props.conf.  at $SPLUNk_HOME/etc/apps/learned/local/ was containing 50000+ sourcetypes.&lt;/P&gt;

&lt;P&gt;It was caused by having source type set to automatic on one of our inputs. For each csv file that got indexed a new source type was created leading to a bloated props.conf. I also got rid of unused entries in transforms.conf.&lt;/P&gt;

&lt;P&gt;So it looks like the parsing job phase look into props.conf/transforms.conf before starting to search.&lt;/P&gt;

&lt;P&gt;It explains why the "Parsing Job..." message would stay on for 2 minutes before having the search done in 1 second.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2014 21:52:18 GMT</pubDate>
    <dc:creator>rbal_splunk</dc:creator>
    <dc:date>2014-10-16T21:52:18Z</dc:date>
    <item>
      <title>Why am I seeing poor search performance for simple searches and high CPU on one core?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172277#M49368</link>
      <description>&lt;P&gt;Splunk deployment -adhoc query have been slow for the past months. &lt;/P&gt;

&lt;P&gt;1- We upgraded our system from 2 core to 12 core on a single server. &lt;BR /&gt;
2- We upgraded from Splunk 5 to 6 (not a fresh install) &lt;/P&gt;

&lt;P&gt;Now system has 16GB of RAM and Disk is 84% full.&lt;BR /&gt;
I have followed the monitoring advice: &lt;BR /&gt;
&lt;A href="http://wiki.splunk.com/Community:PerformanceTroubleshooting" target="_blank"&gt;http://wiki.splunk.com/Community:PerformanceTroubleshooting&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;There is no IO bottleneck. When queries are run, there is only a sporadic spike of activity (iotop). &lt;BR /&gt;
While the search is running there is one process at 100% the whole time. &lt;/P&gt;

&lt;P&gt;I query the _internal for cpu usage, &lt;BR /&gt;
Splunk &amp;gt; index=_internal source=*metrics.log group=pipeline | timechart sum(cpu_seconds) by name &lt;/P&gt;

&lt;P&gt;the index is spiking at 5.455 in some rare occasions, all search are below 1. Whatever that means. The link above mention abnormal usage when the indice is over 30.&lt;BR /&gt;
Memory was at constant 81% usage on the box, After restarting splunk, it dropped to 15%, but performance remained the same&lt;BR /&gt;
To test created a brand new index. &lt;BR /&gt;
 ingested 745 log4j events. &lt;BR /&gt;
There is no data model (I later setup a data model, and accessed it through Pivot, but it was slow too) &lt;BR /&gt;
Basic default setting &lt;/P&gt;

&lt;P&gt;Performed a very simple: &lt;BR /&gt;
index=”my_test_index” | head 1 &lt;/P&gt;

&lt;P&gt;ran the search from the command line. &lt;BR /&gt;
It takes 2 minutes 14 seconds to return the query above &lt;/P&gt;

&lt;P&gt;On the same box, other indexes totaling 360 M events (few GB of data), these are slow too. &lt;/P&gt;

&lt;P&gt;Bottom line, it is constantly slow, every query.&lt;BR /&gt;
The job inspector is telling it spent 96% (120s) of the time doing Dispatch.evaluate.search, &lt;BR /&gt;
all other categories are below 1 sec, most under 0.5 seconds.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:56:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172277#M49368</guid>
      <dc:creator>sat94541</dc:creator>
      <dc:date>2020-09-28T17:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I seeing poor search performance for simple searches and high CPU on one core?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172278#M49369</link>
      <description>&lt;P&gt;I just found what was the problem...&lt;/P&gt;

&lt;P&gt;Found the issue to be with bloated props.conf.  at $SPLUNk_HOME/etc/apps/learned/local/ was containing 50000+ sourcetypes.&lt;/P&gt;

&lt;P&gt;It was caused by having source type set to automatic on one of our inputs. For each csv file that got indexed a new source type was created leading to a bloated props.conf. I also got rid of unused entries in transforms.conf.&lt;/P&gt;

&lt;P&gt;So it looks like the parsing job phase look into props.conf/transforms.conf before starting to search.&lt;/P&gt;

&lt;P&gt;It explains why the "Parsing Job..." message would stay on for 2 minutes before having the search done in 1 second.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 21:52:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172278#M49369</guid>
      <dc:creator>rbal_splunk</dc:creator>
      <dc:date>2014-10-16T21:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I seeing poor search performance for simple searches and high CPU on one core?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172279#M49370</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;

&lt;P&gt;We are facing the same issue now and may you advise how to resolve it? Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 07:53:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172279#M49370</guid>
      <dc:creator>k2bruce</dc:creator>
      <dc:date>2014-11-18T07:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Why am I seeing poor search performance for simple searches and high CPU on one core?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172280#M49371</link>
      <description>&lt;P&gt;The problem is solved by an input whose sourcetype is set to automatic, most likely from a file or directory input. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.2/Data/Bypassautomaticsourcetypeassignment" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.2/Data/Bypassautomaticsourcetypeassignment&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;However, in 6.2+ I am not seeing a way to set sourcetype to automatic when setting up new data inputs.  Best thing I can suggest is too do two things:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Run: &lt;STRONG&gt;$SPLUNK_HOME/bin/cmd btool inputs list --debug&lt;/STRONG&gt; to display all inputs and try to determine erroneous sources of data, disable or modify where necessary.&lt;/LI&gt;
&lt;LI&gt; Move $SPLUNk_HOME/etc/apps/learned/local/props.conf and $SPLUNk_HOME/etc/apps/learned/local/sourcetypes.conf to a temp directory and restart Splunk.&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;This was successful for me today.  Hope this helps - Good Luck!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:14:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-am-I-seeing-poor-search-performance-for-simple-searches-and/m-p/172280#M49371</guid>
      <dc:creator>jwelsh_splunk</dc:creator>
      <dc:date>2020-09-28T19:14:44Z</dc:date>
    </item>
  </channel>
</rss>

