Deployment Architecture

Hot buckets fix?

splunktrainingu
Communicator

How do I fix this issue? I found this search query that pulled up the indexes that was the problem.

Root Cause(s):

The percentage of small buckets (75%) created over the last hour is high and exceeded the red thresholds (50%) for index=_internal, and possibly more indexes, on this indexer. At the time this alert fired, total buckets created=4, small buckets=3

Query:

     index=_internal sourcetype=splunkd component=HotBucketRoller "finished moving hot to warm"
      | eval bucketSizeMB = round(size / 1024 / 1024, 2)
      | table _time splunk_server idx bid bucketSizeMB
      | rename idx as index
      | join type=left index 
          [ | rest /services/data/indexes count=0
            | rename title as index
            | eval maxDataSize = case (maxDataSize == "auto",             750,
                                       maxDataSize == "auto_high_volume", 10000,
                                       true(),                            maxDataSize)
            | table  index updated currentDBSizeMB homePath.maxDataSizeMB maxDataSize maxHotBuckets maxWarmDBCount ]
      | eval bucketSizePercent = round(100*(bucketSizeMB/maxDataSize))
      | eval isSmallBucket     = if (bucketSizePercent < 10, 1, 0)
      | stats sum(isSmallBucket) as num_small_buckets
              count              as num_total_buckets
              by index splunk_server
      | eval  percentSmallBuckets = round(100*(num_small_buckets/num_total_buckets))
      | sort  - percentSmallBuckets
      | eval isViolation = if (percentSmallBuckets > 30, "Yes", "No")

After that I was able to see that main, metrics, and internal were in violation. But from there I am not sure how to determine which source type is causing the issue or how to fix it.

index=main
     | eval latency=_indextime-_time
     | stats min(latency),
             max(latency),
             avg(latency),
             median(latency)
         by index sourcetype

The following command is for when you have determined which sourcetype is causing the issue:

     index=abc sourcetype=def
     | eval latency=_indextime-_time
     | stats min(latency),
             max(latency),
             avg(latency),
             median(latency)
         by index sourcetype host
Labels (1)

jaihingorani
Path Finder

were you able to fix this?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...