Deployment Architecture

How do I determine the appropriate timeout value for distributed search

matt
Splunk Employee
Splunk Employee

I see timeouts with distributed search and currently have receiveTimeout set to 300. What metric(s) can I use to determine the what should be the correct value this setting in order to avoid timeouts?

1 Solution

hexx
Splunk Employee
Splunk Employee

The current default value for this parameter is 600 seconds and there really shouldn't be any good reason to proactively increase or lower it.

If while searching, you see errors reporting search peer timeouts, the right question to ask is "Why are search peers taking more than 600 seconds to respond?".

  • The first place to look for a possible explanation is the search.log file created by the search process on the search-head, in $SPLUNK_HOME/var/run/splunk/dispatch/{SID} where {SID} is the ID of the search.

  • Another good place to look is the search.log file created by the search process on the remote peer, in $SPLUNK_HOME/var/run/splunk/dispatch/remote_{SH-ServerName}_{SID} where {SH-ServerName} is the ServerName as set in server.conf for the search-head that dispatched the search, and {SID} is the ID of the search.

    • As peer timeouts are often linked with network quality issues, it is also a good idea to check that there are no issues with the network link between the search-head and the affected peer(s).

View solution in original post

rstrong30
Loves-to-Learn

Some searches are going back to "ALL TIME" so I'd imagine there is an appropriate time to change the default. Depending on one's environment that could go back quite a few months. So if the default is 600 seconds I would imagine changing this to a few more minutes should be safe, right? If not, what's the repercussions?

0 Karma

hexx
Splunk Employee
Splunk Employee

The current default value for this parameter is 600 seconds and there really shouldn't be any good reason to proactively increase or lower it.

If while searching, you see errors reporting search peer timeouts, the right question to ask is "Why are search peers taking more than 600 seconds to respond?".

  • The first place to look for a possible explanation is the search.log file created by the search process on the search-head, in $SPLUNK_HOME/var/run/splunk/dispatch/{SID} where {SID} is the ID of the search.

  • Another good place to look is the search.log file created by the search process on the remote peer, in $SPLUNK_HOME/var/run/splunk/dispatch/remote_{SH-ServerName}_{SID} where {SH-ServerName} is the ServerName as set in server.conf for the search-head that dispatched the search, and {SID} is the ID of the search.

    • As peer timeouts are often linked with network quality issues, it is also a good idea to check that there are no issues with the network link between the search-head and the affected peer(s).

jdunlea_splunk
Splunk Employee
Splunk Employee

I also need to find this out

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...