Splunk Search

How to increase the maximum number of concurrent historical searches?

perlish
Communicator

Splunk warns that:

The system is approaching the maximum number of historical searches that can be run concurrently. current=55 maximum=68

...but the cpu and mem resouce of the system are free.

How to increase the maximum number of concurrent historical searches?

1 Solution

hexx
Splunk Employee
Splunk Employee

If you want to fiddle with this limit, you'll have to set higher values than the default for base_max_searches or max_searches_per_cpu in $SPLUNK_HOME/etc/system/local/limits.conf. From limits.conf.spec:

[search]

base_max_searches = <int>
* A constant to add to the maximum number of searches, computed as a multiplier of the CPUs.
* Defaults to 4

max_searches_per_cpu = <int>
* The maximum number of concurrent historical searches per CPU. The system-wide limit of  historical searches is computed as: 
  max_hist_searches =  max_searches_per_cpu x number_of_cpus + base_max_searches
* Note: the maximum number of real-time searches is computed as: 
  max_rt_searches = max_rt_search_multiplier x max_hist_searches
* Defaults to 4

Do note, however, that 55 concurrent searches is already a pretty high number. If CPU is not a bottleneck (it seems that you have 16 cores on this machine), it's quite possible that I/O throughput and IOPS on the device hosting the indexes will be.

View solution in original post

Funderburg78
Path Finder

Note: Splunk 7.1.x utilizes the following Defaults:
base_max_searches = 6
max_searches_per_cpu = 1

0 Karma

bhawkins1
Communicator

Semi-unrelated note: If splunk is complaining about "maxsearches" - this isn't the same as the error described above. Instead, see documentation for map.

0 Karma

hexx
Splunk Employee
Splunk Employee

If you want to fiddle with this limit, you'll have to set higher values than the default for base_max_searches or max_searches_per_cpu in $SPLUNK_HOME/etc/system/local/limits.conf. From limits.conf.spec:

[search]

base_max_searches = <int>
* A constant to add to the maximum number of searches, computed as a multiplier of the CPUs.
* Defaults to 4

max_searches_per_cpu = <int>
* The maximum number of concurrent historical searches per CPU. The system-wide limit of  historical searches is computed as: 
  max_hist_searches =  max_searches_per_cpu x number_of_cpus + base_max_searches
* Note: the maximum number of real-time searches is computed as: 
  max_rt_searches = max_rt_search_multiplier x max_hist_searches
* Defaults to 4

Do note, however, that 55 concurrent searches is already a pretty high number. If CPU is not a bottleneck (it seems that you have 16 cores on this machine), it's quite possible that I/O throughput and IOPS on the device hosting the indexes will be.

ChrisG
Splunk Employee
Splunk Employee

Note that in Splunk 5, the default value of max_searches_per_cpu is changed to 1 (from 4). See http://splunk-base.splunk.com/answers/70679/why-are-the-default-values-of-max_searches_per_cpu-and-b... for more information.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Enhance Security Operations with Automated Threat Analysis in the Splunk EcosystemAre you leveraging ...

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...