<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: query running using KV store is taking logn time in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490301#M136920</link>
    <description>&lt;P&gt;Sorry but the one you suggested changes our requirement.&lt;/P&gt;

&lt;P&gt;We are trying to use automatic lookups , so that we can enhance data faster&lt;/P&gt;</description>
    <pubDate>Wed, 27 Nov 2019 12:40:39 GMT</pubDate>
    <dc:creator>vikashperiwal</dc:creator>
    <dc:date>2019-11-27T12:40:39Z</dc:date>
    <item>
      <title>query running using KV store is taking logn time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490298#M136917</link>
      <description>&lt;P&gt;Hi , &lt;/P&gt;

&lt;P&gt;I have a scenario where i am using KV store to get the events generated. But my query is taking 5hr to run which is unexpected .&lt;/P&gt;

&lt;P&gt;Please let me know way to improve the query optimization.&lt;BR /&gt;
index=ndspr sourcetype=ISUP_EVENT_ACCESS_VW ------ 5M events&lt;BR /&gt;
lookup  (lookup core_ip_voice_keystore )had -- 6,00,000&lt;/P&gt;

&lt;P&gt;Total events triggered 5M&lt;/P&gt;

&lt;P&gt;Query-----&lt;/P&gt;

&lt;P&gt;index=ndspr sourcetype=ISUP_EVENT_ACCESS_VW &lt;BR /&gt;
| lookup core_ip_voice_keystore DPC as N OPC as O CIC as K OUTPUT OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ &lt;BR /&gt;
|fields A B C D E F K N O OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ&lt;BR /&gt;
| search  OPC=* &lt;BR /&gt;
| table A B C D E F K N O OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:04:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490298#M136917</guid>
      <dc:creator>vikashperiwal</dc:creator>
      <dc:date>2020-09-30T03:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: query running using KV store is taking logn time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490299#M136918</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;index=ndspr sourcetype=ISUP_EVENT_ACCESS_VW
| eval DPC=N, OPC=O, CIC=K
| inputlookup append=t core_ip_voice_keystore
| table A B C D E F K N O OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi, @vikashperiwal&lt;BR /&gt;
Since &lt;CODE&gt;inputlookup&lt;/CODE&gt; is used with &lt;CODE&gt;append = t&lt;/CODE&gt; ,  &lt;CODE&gt;search OPC = *&lt;/CODE&gt;  is not necessary.&lt;BR /&gt;
How about it?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 11:23:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490299#M136918</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-11-26T11:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: query running using KV store is taking logn time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490300#M136919</link>
      <description>&lt;P&gt;Hi, @vikashperiwal&lt;BR /&gt;
If this is still slow, you should consider creating a data model.&lt;BR /&gt;
I don't know about data model, so please ask again. &lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 12:18:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490300#M136919</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-11-27T12:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: query running using KV store is taking logn time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490301#M136920</link>
      <description>&lt;P&gt;Sorry but the one you suggested changes our requirement.&lt;/P&gt;

&lt;P&gt;We are trying to use automatic lookups , so that we can enhance data faster&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 12:40:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490301#M136920</guid>
      <dc:creator>vikashperiwal</dc:creator>
      <dc:date>2019-11-27T12:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: query running using KV store is taking logn time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490302#M136921</link>
      <description>&lt;P&gt;Try moving the filter for OPC to the base search&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=ndspr sourcetype=ISUP_EVENT_ACCESS_VW O=*
| lookup core_ip_voice_keystore DPC as N OPC as O CIC as K OUTPUT OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ
| table A B C D E F K N O OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you need to configure automatic time lookup, use the following doc for reference &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.0/Knowledge/Makeyourlookupautomatic#Example_configuration_of_an_automatic_KV_Store_lookup"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.0/Knowledge/Makeyourlookupautomatic#Example_configuration_of_an_automatic_KV_Store_lookup&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;In your case.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[ISUP_EVENT_ACCESS_VW]
LOOKUP-core_ip_voice_keystore = core_ip_voice_keystore DPC as N OPC as O CIC as K OUTPUT OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And the your search would be.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=ndspr sourcetype=ISUP_EVENT_ACCESS_VW OPC=*
| table A B C D E F K N O OPC DPC CIC ADNUM ADMININF NETNAME ROUTESET TRKGRSIZ
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 27 Nov 2019 13:21:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/query-running-using-KV-store-is-taking-logn-time/m-p/490302#M136921</guid>
      <dc:creator>arjunpkishore5</dc:creator>
      <dc:date>2019-11-27T13:21:10Z</dc:date>
    </item>
  </channel>
</rss>

