<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Improve search performance in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579294#M10502</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I need to improve the performance of my below search, which currently completes in about 132sec. The search looks for last 7 days data from firewall logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Search:&lt;/P&gt;&lt;P&gt;index="xxx" src_ip !="a.b.c.d/26" src_ip !="x.y.z.w/26" src_zone!=ABCD src_zone!=ABCDE (dest_zone = "ABCD" OR (dvc_name IN ("qwerty","abcd","xyz","asdf") AND dest_zone="XYZ")) app IN (ldap,rmi-iiop) | lookup some_lookup ip as src_ip OUTPUT matched | search matched!="yes" | stats count by src_ip,action,date_mday | stats count by src_ip,action | search (action=allowed OR (action=blocked AND count&amp;gt;1))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shaquib&lt;/P&gt;</description>
    <pubDate>Mon, 27 Dec 2021 10:13:20 GMT</pubDate>
    <dc:creator>shaquibk</dc:creator>
    <dc:date>2021-12-27T10:13:20Z</dc:date>
    <item>
      <title>Improve search performance</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579294#M10502</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I need to improve the performance of my below search, which currently completes in about 132sec. The search looks for last 7 days data from firewall logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Search:&lt;/P&gt;&lt;P&gt;index="xxx" src_ip !="a.b.c.d/26" src_ip !="x.y.z.w/26" src_zone!=ABCD src_zone!=ABCDE (dest_zone = "ABCD" OR (dvc_name IN ("qwerty","abcd","xyz","asdf") AND dest_zone="XYZ")) app IN (ldap,rmi-iiop) | lookup some_lookup ip as src_ip OUTPUT matched | search matched!="yes" | stats count by src_ip,action,date_mday | stats count by src_ip,action | search (action=allowed OR (action=blocked AND count&amp;gt;1))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shaquib&lt;/P&gt;</description>
      <pubDate>Mon, 27 Dec 2021 10:13:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579294#M10502</guid>
      <dc:creator>shaquibk</dc:creator>
      <dc:date>2021-12-27T10:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Improve search performance</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579295#M10503</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236314"&gt;@shaquibk&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can try below, I changed lookup method;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="xxx" src_ip !="a.b.c.d/26" src_ip !="x.y.z.w/26" src_zone!=ABCD src_zone!=ABCDE (dest_zone = "ABCD" OR (dvc_name IN ("qwerty","abcd","xyz","asdf") AND dest_zone="XYZ")) app IN (ldap,rmi-iiop) 
    [| inputlookup some_lookup 
    | fields ip 
    | rename ip as src_ip 
    | format ] 
| stats count by src_ip,action,date_mday 
| stats count by src_ip,action 
| search (action=allowed OR (action=blocked AND count&amp;gt;1))&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Dec 2021 10:52:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579295#M10503</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-12-27T10:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Improve search performance</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579365#M10504</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below method somehow doesn't return any results at all.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Shaquib&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 09:44:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579365#M10504</guid>
      <dc:creator>shaquibk</dc:creator>
      <dc:date>2021-12-28T09:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Improve search performance</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579370#M10505</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;maybe you should use this&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/CIM/5.0.0/User/Overview" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/5.0.0/User/Overview&lt;/A&gt;&amp;nbsp;with data model acceleration? There is&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/CIM/5.0.0/User/NetworkTraffic" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/5.0.0/User/NetworkTraffic&lt;/A&gt;&amp;nbsp;for this kind of use.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 10:48:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Improve-search-performance/m-p/579370#M10505</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2021-12-28T10:48:06Z</dc:date>
    </item>
  </channel>
</rss>

