Hello Team,
I wanna ask something that I really cannot figure out by myself , I have a splunk entreprise Installed on an ubuntu with over 2 To , 32 Go of RAM and 38 CPU.
With all these I still get so many delayed searches (up to 97%) :
""The percentage of non high priority searches delayed (99%) over the last 24 hours is very high and exceeded the red thresholds (20%) on this Splunk instance.""
I really do not know the reason , is it because we are using ES Security or what exactly.
Thank you for your time.
Kind regards,
Hello,
Thank you for your time. I am using a single ubuntu 22.04 instance for Splunk ubuntu with over 2 To , 32 Go of RAM and 38 CPU.
I am using the 10.0.0 version , about the daily ingestion it is around 40 Go.
As i am new to splunk i did not get what you meant by searches (scheduled vs ad-hoc)
I missed ES part earlier. It probably explains your issues. It depends on how many correlation searches and CIM accelerations are running your single box, but I suspect that your environment is too much for running it in single node.
You could find monitoring console under settings. There are links/icon for it. Just click it and then enable it from its setting tab/link. After that there are Search link where you could look those several dashboards which shows e.g. what are those deferred and skipped searches.
Hi @fedayn05 ,
in addition to the checks hinted by @richgalloway ,
check the IOPS of your storage (e.g. using Bonnie++ or anothe tool) : probably this is the bottleneck.
Ciao.
Giuseppe
Hello,
Thank you for your time. I have checked this first and it was actually not the source of the problem.
Thank you for your time.
Searches are delayed because too many searches are trying to run at the same time. There are a few things you can do about it.
Hello,
Thank you for your time.
As I am a bit new to splunk , I would appreciate it if you can please explain a bit further these steps.
Thank you
They are not "steps". They're separate checks/measures to perform to try to alleviate delayed searches.