Getting Data In

High CPU utilization with splunk 9.x ( mainly windows UF)

hrawat_splunk
Splunk Employee
Splunk Employee

After upgrade to 9.x, higher cpu utilization.

Labels (2)
0 Karma
1 Solution

hrawat_splunk
Splunk Employee
Splunk Employee

Run following search

 

index=_internal source=*metrics.log* ratio > 0.8| timechart max(ratio) by thread

 

Search will show threads using higher cpu.
If one of the thread is  SplunkConfigChangeWatcherThread, then disable new splunk config change tracker feature.

In server.conf
[config_change_tracker]
disabled = true


 

View solution in original post

0 Karma

hrawat_splunk
Splunk Employee
Splunk Employee

Run following search

 

index=_internal source=*metrics.log* ratio > 0.8| timechart max(ratio) by thread

 

Search will show threads using higher cpu.
If one of the thread is  SplunkConfigChangeWatcherThread, then disable new splunk config change tracker feature.

In server.conf
[config_change_tracker]
disabled = true


 

0 Karma
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...