Splunk Search

Number of returned events doesn't equal number of events displayed

coltadkison
Explorer

During some searches the number of events that are supposed to be returned does not match the number of events that are actually displayed. In one instance the Events counter showed 13 events, but the timeline showed "No events found" and none were displayed. In other instances fewer events are displayed than the counter states that there should be.

In the search log there are errors for Timeliner like: "08-30-2017 12:58:47.035 ERROR Timeliner - Ignored 2 events because they were after the commit time (0).". If you add up the number of ignored events you get a number equaling the number of events that are missing from the timeline. There are also log entries like: "08-30-2017 12:58:38.909 WARN SearchResultCollator - Collector X produced chunk with startTime 1503348584.000000 when our cursor time was already 0.000000, time ordering has failed!" that may or may not be related.

Running the search again usually fixes the issue, but I'd like to resolve the underlying issue or be able to explain the cause to users that report the issue.

Has anyone seen this? Can you provide details as to why events are ignored?

1 Solution

jhall0007
Path Finder

I have a similar problem and received similar errors in the search.log file. Splunk support advised this was a bug and suggested applying the following configuration tweak:

  • Edit $SPLUNK_HOME/etc/system/local/limits.conf on your indexers, and add the following:

[search]
search_keepalive_frequency = 60000

  • Save and close the file, then restart the indexer instances

View solution in original post

13yqiao
Engager

A sort _time in search seems to mitigate the error for us, however, this does not fix the underlying issue.

jhall0007
Path Finder

I have a similar problem and received similar errors in the search.log file. Splunk support advised this was a bug and suggested applying the following configuration tweak:

  • Edit $SPLUNK_HOME/etc/system/local/limits.conf on your indexers, and add the following:

[search]
search_keepalive_frequency = 60000

  • Save and close the file, then restart the indexer instances

coltadkison
Explorer

I tried this on our cluster, but it didn't seem to work.

Did you have success with it?

0 Karma

jhall0007
Path Finder

Unfortunately this did not appear to resolve the issue for us either.

0 Karma

woodcock
Esteemed Legend

Open a support case.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...