<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Significant search performance hit using multiple indexes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25286#M4745</link>
    <description>&lt;P&gt;I would recommend one index per customer.  You can use sourcetypes to differentiate the datafeeds.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Aug 2013 15:06:27 GMT</pubDate>
    <dc:creator>emiller42</dc:creator>
    <dc:date>2013-08-06T15:06:27Z</dc:date>
    <item>
      <title>Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25277#M4736</link>
      <description>&lt;P&gt;I'm seeing three seconds of latency introduced to each search when using ~3,500 indexes.  Here's the scenario:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;~3,000,000 events for source "X", all stored within the main default index&lt;/LI&gt;
&lt;LI&gt;No data in any of the other custom ~3,500 indexes&lt;/LI&gt;
&lt;LI&gt;Free license&lt;/LI&gt;
&lt;LI&gt;32g/ram, i7 series 4, 1tb/ssd&lt;/LI&gt;
&lt;LI&gt;I've not violated the free tier indexing threshold&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Using the admin account, a search as simple as "sourcetype=x" seems to wait roughly three seconds before beginning to fetch results.  When I remove all the custom indexes, things fly like normal.  Considering I'm not storing data in the extra indexes yet, I wouldn't expect a noticeable performance impact.  As I create additional indexes, performance seems to drop.  &lt;/P&gt;

&lt;P&gt;What could be causing this?  &lt;A href="http://splunk-base.splunk.com/answers/40519/how-many-indexes-canshould-one-indexer-support-per-cpu-core"&gt;This link&lt;/A&gt; suggests it's not the number of indexes that count, it's the data.  My experience shows the inverse.  What is the maximum number of indexes per instance before running into issues?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 17:34:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25277#M4736</guid>
      <dc:creator>andywins</dc:creator>
      <dc:date>2013-08-05T17:34:02Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25278#M4737</link>
      <description>&lt;P&gt;I wouldn't do this many index but curious to know the reason as i see something similar with me.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 17:57:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25278#M4737</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-05T17:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25279#M4738</link>
      <description>&lt;P&gt;I'd wager that it is still tied to the number of indexes. Even if those indexes don't contain data, each bloomfilter on each index bucket must be checked for matches. So even though its a quick search of the bloomfilter, you are still performing it &lt;CODE&gt;~3500 * #BucketsInIndex&lt;/CODE&gt; times. Try doing your search like this and see if it speeds up:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index=main sourcetype=x| blah blah&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&lt;A href="http://docs.splunk.com/Splexicon:Bloomfilter" target="test_blank"&gt;http://docs.splunk.com/Splexicon:Bloomfilter&lt;/A&gt;&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 18:17:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25279#M4738</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2013-08-05T18:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25280#M4739</link>
      <description>&lt;P&gt;But when i added another 20 indexes to existing 20 i felt the searches had slowed down even if the new indexes didn't contain any data. Any possible reason?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 18:42:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25280#M4739</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-05T18:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25281#M4740</link>
      <description>&lt;P&gt;But if you don't explicitly declare in your search which index, the search still hits every index location, and depending on your disk speeds, might introduce some latency.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 19:11:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25281#M4740</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2013-08-05T19:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25282#M4741</link>
      <description>&lt;P&gt;Sorry i should have been specific, I meant the dashboards which are having proper search queries.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 19:42:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25282#M4741</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-05T19:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25283#M4742</link>
      <description>&lt;P&gt;Uh, 3500 indexes is &lt;EM&gt;way&lt;/EM&gt; above the expected parameters. I would hesitate to use more than 200. Frankly, I would be happy to only see 3 seconds of latency on searches with that many indexes, but I suspect that's because you have a good SSD. Every index of course means more places to look for every search (even if it's empty, it's impossible to know it's empty w/o looking) as well as overhead checking for whether its full, etc.&lt;/P&gt;

&lt;P&gt;What are you using 3500 indexes for? I wonder whether you need that or whether you can just put them into fewer.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2013 19:54:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25283#M4742</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2013-08-05T19:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25284#M4743</link>
      <description>&lt;P&gt;Thanks for the comments.  I'll be bulk loading some data this week to vet the suggested approach.  I'm using two Samsung 840 pro 500gb ssd's, striped.  gkanapathy, we have this many customers and I want to partition their data, both for speed and security.  Right now I can create roles/users locked down to a specific index.  Ideally, I would have an index for each datafeed per customer (15 feeds * 3500 clients = 52,500 indexes).  Let me know if you can think of a better approach.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2013 13:54:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25284#M4743</guid>
      <dc:creator>andywins</dc:creator>
      <dc:date>2013-08-06T13:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25285#M4744</link>
      <description>&lt;P&gt;As long as you can single out the indexes you need for each query this won't be as big a problem since in that case Splunk knows immediately which indexes to open. If you do need to run loads and loads of searches over &lt;EM&gt;ALL&lt;/EM&gt; indexes that could be more problematic.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2013 13:57:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25285#M4744</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-08-06T13:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25286#M4745</link>
      <description>&lt;P&gt;I would recommend one index per customer.  You can use sourcetypes to differentiate the datafeeds.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2013 15:06:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25286#M4745</guid>
      <dc:creator>emiller42</dc:creator>
      <dc:date>2013-08-06T15:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25287#M4746</link>
      <description>&lt;P&gt;Just a reminder: please accept the answer if we have answered your question. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2013 16:10:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25287#M4746</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2013-08-06T16:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Significant search performance hit using multiple indexes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25288#M4747</link>
      <description>&lt;P&gt;Indeed, limiting to explicit indexes increases performance.  Thanks alacercogitatus&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2013 17:51:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Significant-search-performance-hit-using-multiple-indexes/m-p/25288#M4747</guid>
      <dc:creator>andywins</dc:creator>
      <dc:date>2013-08-16T17:51:55Z</dc:date>
    </item>
  </channel>
</rss>

