<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Summary Index best practice in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77742#M754</link>
    <description>&lt;P&gt;Thank you for the response.&lt;BR /&gt;
Quick question: should "| stats min(cpu)..." be "| sistats min(cpu)..."? If not, at what point do I need to preface things with "si". The manual mentioned that somewhere.&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
    <pubDate>Wed, 27 Oct 2010 03:21:15 GMT</pubDate>
    <dc:creator>Branden</dc:creator>
    <dc:date>2010-10-27T03:21:15Z</dc:date>
    <item>
      <title>Summary Index best practice</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77740#M752</link>
      <description>&lt;P&gt;I have a dashboard that has a pull-down menu with a list of our hosts. By selecting a host, one can get a snapshot of that host's status- paging space use, web server hits, vmstat data, SAN disk stats, etc... (Note: because we're on AIX, we cannot run the *nix app, so we get our paging/vmstat data through commands sent to stdout and captured into Splunk). &lt;/P&gt;

&lt;P&gt;Unfortunately, it takes a while to display all the results on the dashboard. When you have 20 hosts to check, it adds up fast. &lt;/P&gt;

&lt;P&gt;I was thinking it would be a good idea to use summary indexing to speed things up a bit. I'm just not sure what the best way to structure this should be. Should I create a summary index "si-paging" (and "si-san", "si-webhits", etc...) that will capture all that information across all hosts every few minutes, then call that search when I select a host from the menu? Or should I do it from the other angle and create a summary index for each host, containing its paging/SAN/web server/etc data?&lt;/P&gt;

&lt;P&gt;I'm thinking the latter would be better; from what I read, you can't add a search parameter when you call a saved search from a summary index. From the docs: "The search against the summary index cannot create or modify fields before the | stats  command. That means I wouldn't be able to add a "host = 'xyz'". Do I have that right? &lt;/P&gt;

&lt;P&gt;Is my logic sound here? Is it best to create a summary index for each host and generate my results in the dashboard that way?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2010 20:49:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77740#M752</guid>
      <dc:creator>Branden</dc:creator>
      <dc:date>2010-10-26T20:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Summary Index best practice</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77741#M753</link>
      <description>&lt;P&gt;Just use the default 'summary' index, and create 'markers' for each type of populating search.  For example, a summary-index populating search could be:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=your_sourcetype | stats min(cpu) as min_cpu avg(cpu) as avg_cpu max(cpu) as max_cpu by host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When you are going through the saved search workflow, set earliest to -5m, latest to +0s, schedule the search to run every 5 minutes, and check the "enable summary indexing" checkbox, add the key "marker" and the value "cpu_by_host_5m" or something similar.&lt;/P&gt;

&lt;P&gt;Then, to build your dashboard, use the following search or something similar (assuming $host$ is a replacement intention from your drop-down):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=summary marker=cpu_by_host_5m $host$ | timechart max(max_cpu) min(min_cpu) avg(avg_cpu)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 27 Oct 2010 03:18:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77741#M753</guid>
      <dc:creator>araitz</dc:creator>
      <dc:date>2010-10-27T03:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: Summary Index best practice</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77742#M754</link>
      <description>&lt;P&gt;Thank you for the response.&lt;BR /&gt;
Quick question: should "| stats min(cpu)..." be "| sistats min(cpu)..."? If not, at what point do I need to preface things with "si". The manual mentioned that somewhere.&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Oct 2010 03:21:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77742#M754</guid>
      <dc:creator>Branden</dc:creator>
      <dc:date>2010-10-27T03:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: Summary Index best practice</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77743#M755</link>
      <description>&lt;P&gt;If you feel confident that you can handle all the statistical operations and field names yourself in your summary-index populating search, then you don't need sistats.  Per the docs, sistats is a better choice if you are new to Splunk and new to summary indexing.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2011 01:58:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-Index-best-practice/m-p/77743#M755</guid>
      <dc:creator>araitz</dc:creator>
      <dc:date>2011-01-04T01:58:30Z</dc:date>
    </item>
  </channel>
</rss>

