Getting Data In

Splunk Universal Forwarder Slow

ebay_nkitmitto
Engager

My Splunk forwarder is forwarding ~5 events per second (per my Deployment Monitor on my search head). The maxKBps is set to 20,000 and Splunk is transferring at a rate of 16,000 KBps. Why is the number of events so low? I have 27TB of data (and then some) that need to be indexed, these are historical log files.

I do have indexer acknowledgement enabled in my environment as well.

1 Solution

ebay_nkitmitto
Engager

By adding "maxQueueSize=500MB" to the outputs.conf file, under the [tcpout] stanza.

Change the 500MB to whatever you wish. It defaults to 500kb I believe. But be careful, because whatever you set this number to, it will consume 3x more RAM. So if you have it set to 500MB, it'll consume 1500MB of RAM.

Please this for more info (search for maxQueueSize):
http://docs.splunk.com/Documentation/Splunk/5.0.2/Admin/Outputsconf

View solution in original post

ebay_nkitmitto
Engager

By adding "maxQueueSize=500MB" to the outputs.conf file, under the [tcpout] stanza.

Change the 500MB to whatever you wish. It defaults to 500kb I believe. But be careful, because whatever you set this number to, it will consume 3x more RAM. So if you have it set to 500MB, it'll consume 1500MB of RAM.

Please this for more info (search for maxQueueSize):
http://docs.splunk.com/Documentation/Splunk/5.0.2/Admin/Outputsconf

Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...