Deployment Architecture

Indexer performance problems after upgrade

cjaramilloc
Explorer

Hello,

I hope you can help me to figure out what is going on.

I have a distributed environment, a search head and two indexers. 

I've recently upgraded to Splunk 8.1.3 from 7.3. But one of my two indexers its not working properly, the splunkd service is taking all the CPU and memory resources...  now the server its painfully slow...

The search head I''m seeing messages like this:

The percentage of non high priority searches delayed (50%) over the last 24 hours is very high and exceeded the red thresholds (20%) on this Splunk instance. Total Searches that were part of this percentage=8065. Total delayed Searches=4070

TCPOutAutoLB-0 Errors

 

 

 

 

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi8 @cjaramilloc,

there's no reason I can see for this behaviour,

You could use the Monitoring Console to see if there are too heavy searches and which searches are delayed and try to disable that app.

Anyway, my hint is to open a case to the Splunk Support.

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...