<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic index investigation in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711386#M21623</link>
    <description>&lt;P&gt;So we are starting a new project soon, and basically our boss is personally sending me an index (not internal) to investigate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Investigate as far as as far as usage. We are trying to optimize the env and cut whats not being used, or checking to see what is being overused. KO'S, data intake, etc.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any good practices, processes or tips you can lend? this would be the most perfect learning opportunity. Im excited, but nervous.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 16:39:44 GMT</pubDate>
    <dc:creator>Kenny_splunk</dc:creator>
    <dc:date>2025-02-12T16:39:44Z</dc:date>
    <item>
      <title>index investigation</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711386#M21623</link>
      <description>&lt;P&gt;So we are starting a new project soon, and basically our boss is personally sending me an index (not internal) to investigate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Investigate as far as as far as usage. We are trying to optimize the env and cut whats not being used, or checking to see what is being overused. KO'S, data intake, etc.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any good practices, processes or tips you can lend? this would be the most perfect learning opportunity. Im excited, but nervous.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 16:39:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711386#M21623</guid>
      <dc:creator>Kenny_splunk</dc:creator>
      <dc:date>2025-02-12T16:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: index investigation</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711393#M21624</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/266305"&gt;@Kenny_splunk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the tstats command to track index usage over time. This will help you identify peaks and patterns in data usage.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiran_panchavat_0-1739378932220.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34467iB7AC7E72FC5CE147/image-size/medium?v=v2&amp;amp;px=400" role="button" title="kiran_panchavat_0-1739378932220.png" alt="kiran_panchavat_0-1739378932220.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Review and adjust your index retention policies to ensure that data is stored only for as long as needed. This can help reduce storage costs.&lt;/LI&gt;&lt;LI&gt;Review saved searches and reports to ensure they are still relevant and being used. Disable or delete those that are not needed.&lt;/LI&gt;&lt;LI&gt;Optimize your searches by using efficient search commands and avoiding unnecessary subsearches. Use summary indexing and data models for faster results.&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;STRONG&gt;Index Usage Over Time:&lt;/STRONG&gt;&lt;/H4&gt;&lt;DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiran_panchavat_1-1739379010286.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34468i134539AB7C2ADC2E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="kiran_panchavat_1-1739379010286.png" alt="kiran_panchavat_1-1739379010286.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 16:51:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711393#M21624</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-02-12T16:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: index investigation</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711394#M21625</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/266305"&gt;@Kenny_splunk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Find sourcetypes that are consuming a lot of data, especially unnecessary logs&lt;/LI&gt;&lt;LI&gt;Reduce retention or delete them if they are no longer needed.&lt;/LI&gt;&lt;LI&gt;If multiple indexes contain similar data, consolidate where possible.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 16:55:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711394#M21625</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-02-12T16:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: index investigation</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711418#M21629</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/266305"&gt;@Kenny_splunk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the best place to start here is by checking the _audit index to see who is using/searching aginst the index in question...&lt;/P&gt;&lt;P&gt;Start off with the following query and take it from there:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_audit search="*&amp;lt;yourIndexName&amp;gt;*" info=completed action=search&lt;/LI-CODE&gt;&lt;P&gt;Its important to remember, however, than some people might search for index=* in order to access a particular index, which might not come up in the above search. They might also use something like win* instead of win_events.&amp;nbsp;&lt;BR /&gt;People can use index="yourName", index=yourName, index IN (yourName,anotherName) etc etc which is why I included the wildcards either side for the above sample query. You might want to tune to your environment etc as you see fit!&lt;/P&gt;&lt;P&gt;In these logs you should find a number of useful fields, such as "search" (what they ran) and "user" (Who ran it) amonst other things llike event_count and result_count.&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 21:37:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/index-investigation/m-p/711418#M21629</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-02-12T21:37:31Z</dc:date>
    </item>
  </channel>
</rss>

