Splunk Enterprise

Currently we are facing issues that Splunk can not display results correctly

anil1432
Explorer

I would like to ask a question about changing settings of Splunk

 
We have been using Splunk for few years for now. currently we are facing issues that Splunk can not display results correctly.

■Background History
We observe users churn rate through Splunk by using query.


■Phenomenon we are facing
The report count looks incorrect and we could see this error as below.
---
[subsearch]: Subsearch produced 2602757 results, truncating to maxout 2000000.
---

■Question
As we investigated through some docs, I guess we have a option to change the upper limits by changing "limits.conf".
Would it be possible to change limits from current 2,000,000 to 3,000,000 or 3,500,000 ?
*Docs url
https://docs.splunk.com/Documentation/Splunk/8.1.2/Admin/Limitsconf
https://community.splunk.com/t5/Splunk-Search/Subsearch-produced-50000-results-truncating-to-maxout-...
I would appreciate if you could check and change our Splunk settings.
Labels (1)
0 Karma

dave_null
Path Finder

It sounds like you are on the right path. Are you able to identify which search is causing this error? The setting that you have to change to up the limit is different depending on whether the broken search uses subsearches or join commands.

0 Karma

anil1432
Explorer

If you won't mind .

Can you plz provide me a steps to resolve it

0 Karma

isoutamo
SplunkTrust
SplunkTrust

In general level it's better to try to convert that sub search to something else than just increase those limits. Usually splunk is much faster and use less resources without subsearches.

Can you post your query and maybe some event so we could try to help you to avoid subsearch if possible?

r. Ismo

0 Karma

anil1432
Explorer

This is my query sir,

 

(host=wscreenapi3* OR host=tracking-api-release) name="RegisteredUserLog" earliest=-60d@d latest=-30d@d id!=3000000010 | fields event_id platform | fields - _raw | stats count by event_id platform | dedup event_id | rename event_id as easy_id | table easy_id platform | join type=left easy_id [search (host=wscreenapi3* OR host=tracking-api-release) name="RegisteredUserLog" earliest=-30d@d latest=@d id!=3000000010 | fields event_id | fields - _raw | stats count by event_id | rename event_id as easy_id | table easy_id | eval retentionFlg=1] | eval platform_str=if(platform="0","Android",if(platform="1","iPhone",if(platform="2","Web (Android)",if(platform="3","Web (iPhone)","Unknown"))))| stats count(easy_id) as basedUserCount sum(retentionFlg) as retentionUserCount by platform_str | addcoltotals labelfield=platform_str | eval customerChurnRate=(basedUserCount - retentionUserCount) / basedUserCount * 100 |eval baseUserListDateFrom = strftime(relative_time(now(),"-60d@d"), "%Y/%m/%d")." 00:00:00" |eval baseUserListDateTo = strftime(relative_time(now(),"-31d@d"), "%Y/%m/%d")." 23:59:59" |eval compareUserListDateFrom = strftime(relative_time(now(),"-30d@d"), "%Y/%m/%d") ." 00:00:00" |eval compareUserListDateTo = strftime(relative_time(now(),"-1d@d"), "%Y/%m/%d") ." 23:59:59" | table baseUserListDateFrom baseUserListDateTo compareUserListDateFrom compareUserListDateTo platform_str basedUserCount retentionUserCount customerChurnRate. 

Can you please help me further plz

 

 

 

0 Karma

isoutamo
SplunkTrust
SplunkTrust

You want to compare between last two months difference of user amount in different platforms, if I understand right your SPL?

btw: try to use insert/edit code block when you paste SPL or config etc. there. It's easier for us to read your examples. 

r. Ismo

0 Karma

anil1432
Explorer

1.(host=wscreenapi3* OR host=tracking-api-release) name="RegisteredUserLog" earliest=-60d@d latest=-30d@d id!=3000000010 | fields event_id platform | fields - _raw | stats count by event_id platform | dedup event_id | rename event_id as easy_id | table easy_id platform | join type=left easy_id

2.[search (host=wscreenapi3* OR host=tracking-api-release) name="RegisteredUserLog" earliest=-30d@d latest=@d id!=3000000010 | fields event_id | fields - _raw | stats count by event_id | rename event_id as easy_id | table easy_id | eval retentionFlg=1]

 

3. | eval platform_str=if(platform="0","Android",if(platform="1","iPhone",if(platform="2","Web (Android)",if(platform="3","Web (iPhone)","Unknown"))))| stats count(easy_id) as basedUserCount sum(retentionFlg) as retentionUserCount by platform_str | addcoltotals labelfield=platform_str | eval customerChurnRate=(basedUserCount - retentionUserCount) / basedUserCount * 100 |eval baseUserListDateFrom = strftime(relative_time(now(),"-60d@d"), "%Y/%m/%d")." 00:00:00" |eval baseUserListDateTo = strftime(relative_time(now(),"-31d@d"), "%Y/%m/%d")." 23:59:59" |eval compareUserListDateFrom = strftime(relative_time(now(),"-30d@d"), "%Y/%m/%d") ." 00:00:00" |eval compareUserListDateTo = strftime(relative_time(now(),"-1d@d"), "%Y/%m/%d") ." 23:59:59" | table baseUserListDateFrom baseUserListDateTo compareUserListDateFrom compareUserListDateTo platform_str basedUserCount retentionUserCount customerChurnRate.

 

This is you want me do sir or anything else do I need to do 

Can you give me  suggestions

Thanks in advance

 

 

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...