<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176654#M50750</link>
    <description>&lt;P&gt;Thanks MuS, anyway I want to search the whole data what I received. So I am not able to specify particular index/source/sourcetype here. Is there any other option?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jan 2015 09:21:57 GMT</pubDate>
    <dc:creator>splunkn</dc:creator>
    <dc:date>2015-01-09T09:21:57Z</dc:date>
    <item>
      <title>Splunk query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176652#M50748</link>
      <description>&lt;P&gt;I need to search whether a set of ips (say 15 to 20 ips) are present in all the events (no specific index,source,sourcetype) for the past 7 days.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;I run a simple search,&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;index=*  "a.b.c.d" OR "d.e.f.g" OR "d.s.d.d" ....&lt;/P&gt;

&lt;P&gt;Then I extract a multivalue field to extract the ip wherever present in the event.&lt;/P&gt;

&lt;P&gt;index=* universalip="a.b.c.d" OR "d.e.f.g" OR "d.s.d.d" ....&lt;/P&gt;

&lt;P&gt;It consumes much time. Is there any way to optimize the query?&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2015 08:06:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176652#M50748</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-01-09T08:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176653#M50749</link>
      <description>&lt;P&gt;Hi splunkn,&lt;/P&gt;

&lt;P&gt;any search containing either specific &lt;CODE&gt;index&lt;/CODE&gt;,&lt;CODE&gt;source&lt;/CODE&gt; or &lt;CODE&gt;sourcetype&lt;/CODE&gt; will be faster; take a look at this great answer here &lt;A href="http://answers.splunk.com/answers/172275/how-do-optimizations-for-field-based-searches-work.html"&gt;http://answers.splunk.com/answers/172275/how-do-optimizations-for-field-based-searches-work.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also, search like this might be a bit faster:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* universalip="a.b.c.d" OR universalip="d.e.f.g" OR universalip="d.s.d.d"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But still, try to use any specific &lt;CODE&gt;index&lt;/CODE&gt; or &lt;CODE&gt;source&lt;/CODE&gt; or &lt;CODE&gt;sourcetype&lt;/CODE&gt; in your base search and it will be much faster.&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2015 08:13:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176653#M50749</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-01-09T08:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176654#M50750</link>
      <description>&lt;P&gt;Thanks MuS, anyway I want to search the whole data what I received. So I am not able to specify particular index/source/sourcetype here. Is there any other option?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2015 09:21:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176654#M50750</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-01-09T09:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176655#M50751</link>
      <description>&lt;P&gt;One possible way to speed it up, you can limit / specify the indexes which are search by default for the users role  &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.1/Security/Addandeditroles"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.1/Security/Addandeditroles&lt;/A&gt; but then on the other hand, you're not searching the whole data.....&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2015 10:28:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query/m-p/176655#M50751</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-01-09T10:28:39Z</dc:date>
    </item>
  </channel>
</rss>

