Splunk Enterprise

How to resolve field extractor error

abhayneilam
Contributor

Hi,
I am getting the following error, kindly let me know what can be done if this error comes again and my searching is too slow, how to increase the speed of searching.

Field extractor name=usb_trans is unusually slow (max single event time=1078ms, probes=65 warning max=1000ms)

Please help as it is taking too much time to search for the data

Thanks in advance

0 Karma
1 Solution

MuS
SplunkTrust
SplunkTrust

hi abhayneilam

please use the search before asking questions, it took me not even 20 sec to find the answer for your message.....

The solutions are :

  • identify and improve the regexes/field extractions ( best to do )
  • or change the warning threshold for key values extraction ( this way you are only fighting the smoke but not the fire )

edit $SPLUNK_HOME/etc/system/local/limits.conf, and change max_extractor_time value

see http://docs.splunk.com/Documentation/Splunk/5.0/Admin/Limitsconf

[kv]
max_extractor_time = 
# Maximum amount of CPU time, in milliseconds, that a key-value pair extractor will be allowed to  take before warning. If the extractor exceeds this execution time on any event a warning will be issued  Defaults to 1000

avg_extractor_time = 
# Maximum amount of CPU time, in milliseconds, that the average (over search results) execution time of   a key-value pair extractor will be allowed to take before warning. Once the average becomes larger  than this amount of time a warning will be issued Defaults to 500

cheers,

MuS

View solution in original post

MuS
SplunkTrust
SplunkTrust

hi abhayneilam

please use the search before asking questions, it took me not even 20 sec to find the answer for your message.....

The solutions are :

  • identify and improve the regexes/field extractions ( best to do )
  • or change the warning threshold for key values extraction ( this way you are only fighting the smoke but not the fire )

edit $SPLUNK_HOME/etc/system/local/limits.conf, and change max_extractor_time value

see http://docs.splunk.com/Documentation/Splunk/5.0/Admin/Limitsconf

[kv]
max_extractor_time = 
# Maximum amount of CPU time, in milliseconds, that a key-value pair extractor will be allowed to  take before warning. If the extractor exceeds this execution time on any event a warning will be issued  Defaults to 1000

avg_extractor_time = 
# Maximum amount of CPU time, in milliseconds, that the average (over search results) execution time of   a key-value pair extractor will be allowed to take before warning. Once the average becomes larger  than this amount of time a warning will be issued Defaults to 500

cheers,

MuS

abhayneilam
Contributor

Many Many thanks MuS !!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...