Splunk Search

Number of returned events doesn't equal number of events displayed

coltadkison
Explorer

During some searches the number of events that are supposed to be returned does not match the number of events that are actually displayed. In one instance the Events counter showed 13 events, but the timeline showed "No events found" and none were displayed. In other instances fewer events are displayed than the counter states that there should be.

In the search log there are errors for Timeliner like: "08-30-2017 12:58:47.035 ERROR Timeliner - Ignored 2 events because they were after the commit time (0).". If you add up the number of ignored events you get a number equaling the number of events that are missing from the timeline. There are also log entries like: "08-30-2017 12:58:38.909 WARN SearchResultCollator - Collector X produced chunk with startTime 1503348584.000000 when our cursor time was already 0.000000, time ordering has failed!" that may or may not be related.

Running the search again usually fixes the issue, but I'd like to resolve the underlying issue or be able to explain the cause to users that report the issue.

Has anyone seen this? Can you provide details as to why events are ignored?

1 Solution

jhall0007
Path Finder

I have a similar problem and received similar errors in the search.log file. Splunk support advised this was a bug and suggested applying the following configuration tweak:

  • Edit $SPLUNK_HOME/etc/system/local/limits.conf on your indexers, and add the following:

[search]
search_keepalive_frequency = 60000

  • Save and close the file, then restart the indexer instances

View solution in original post

13yqiao
Engager

A sort _time in search seems to mitigate the error for us, however, this does not fix the underlying issue.

jhall0007
Path Finder

I have a similar problem and received similar errors in the search.log file. Splunk support advised this was a bug and suggested applying the following configuration tweak:

  • Edit $SPLUNK_HOME/etc/system/local/limits.conf on your indexers, and add the following:

[search]
search_keepalive_frequency = 60000

  • Save and close the file, then restart the indexer instances

coltadkison
Explorer

I tried this on our cluster, but it didn't seem to work.

Did you have success with it?

0 Karma

jhall0007
Path Finder

Unfortunately this did not appear to resolve the issue for us either.

0 Karma

woodcock
Esteemed Legend

Open a support case.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

Ready to make your IT operations smarter and more efficient? Discover how to automate Splunk alerts with Red ...