Skip to content

Commit 6a2ed51

Browse files
authored
Update savedsearches.conf
1 parent 5ca6fbc commit 6a2ed51

File tree

1 file changed

+0
-32
lines changed

1 file changed

+0
-32
lines changed

default/savedsearches.conf

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -8708,38 +8708,6 @@ search = index=_configtracker host=example \
87088708
| fields - _raw field_match_sum linecount closed_txn duration \
87098709
| where NOT new_value=old_value
87108710

8711-
[IndexerLevel - indexes with unflushed buckets]
8712-
action.keyindicator.invert = 0
8713-
alert.suppress = 0
8714-
alert.track = 1
8715-
alert.digest_mode = 1
8716-
alert.severity = 4
8717-
alert_condition = where statusCode>500 AND count>5
8718-
counttype = number of events
8719-
cron_schedule = 4 * * * *
8720-
description = Chance the alert requires action? Moderate. The first setting to check is the splitByIndexKeys setting on the index, such as, metric.splitByIndexKeys = metric_name\
8721-
This can result in an issue when there are many unique metric names\
8722-
\
8723-
Example message:\
8724-
09-09-2024 01:27:21.990 +0000 INFO HotDBManager [41851 indexerPipe] - idx=index-name Flushing bucket id=42. maxHotOpen=10, have count=11 unflushed buckets
8725-
dispatch.earliest_time = -60m@m
8726-
dispatch.latest_time = now
8727-
display.events.fields = ["host","source","sourcetype"]
8728-
display.general.type = statistics
8729-
display.page.search.tab = statistics
8730-
display.visualizations.charting.chart = area
8731-
enableSched = 1
8732-
quantity = 0
8733-
relation = greater than
8734-
request.ui_dispatch_app = SplunkAdmins
8735-
request.ui_dispatch_view = search
8736-
search = ``` unflushed buckets may relate to excessive bucket rolling. If using a setting similar to metric.splitByIndexKeys then this may require a review to prevent performance issues```\
8737-
index=_internal sourcetype=splunkd bucket `splunkadmins_splunkd_source` "unflushed buckets" `indexerhosts` \
8738-
| eval indexer_cluster=`indexer_cluster_name(splunk_server)`\
8739-
| stats count, min(_time) AS firstseen, max(_time) AS lastseen by idx, indexer_cluster\
8740-
| eval firstseen=strftime(firstseen, "%+"), lastseen=strftime(lastseen, "%+")
8741-
disabled = 1
8742-
87438711
[SearchHeadLevel - Job performance data per indexer handoff time]
87448712
action.email.useNSSubject = 1
87458713
alert.track = 0

0 commit comments

Comments
 (0)