Alerting

How to implement base search for servers traffic monitoring dashboards?

asplunk789
Loves-to-Learn Everything

Hi Team, 

How to implement the base search functionality to improve the loading time of Splunk dashboard. I have multiple panels with many server types. Each panel has one type of server. Every time when am changing the time filter, taking so much time to load the panels with each server traffic data. 

So how I can improve this loading time by implementing the base search functionality? Please suggest on this.

0 Karma

FelixLeh
Contributor

Hi @asplunk789!
Here is a run anywhere Dashboard that uses a base search in multiple panels with a dynamic time input.
Remember that you can run into trouble using base searches when the data from you base search is not in table format/has not run any transformative commands before piping them into the panels. In the given example this is not a problem because data from "| makeresults" is already in a table format. With event based data it can help to run a "| table" or "| stats" command at the end of the base search if you have trouble getting results.

As @gcusello said in the reply to my post it is not necessary to use a command like "| table" or  "| stats" to get a results from your base search. Using "| fields" to specify what fields you want to keep is sufficient. 
Though you can still of course use commands like "| stats" in the base search if it suits you use case!

Hope this helps!

 

 

<form version="1.0">
<search id="base1">
<query>
| makeresults count=10
| eval Test = "This is a Test Event"
</query>
<earliest>$time_token.earliest$</earliest>
<latest>$time_token.latest$</latest>
</search>
<label>Test Dashboard</label>
<fieldset submitButton="false">
<input type="time" token="time_token">
<label></label>
<default>
<earliest>-24h@h</earliest>
<latest>now</latest>
</default>
</input>
</fieldset>
<row>
<panel>
<table>
<search base="base1">
<query>| stats count</query>
</search>
<option name="drilldown">none</option>
<option name="refresh.display">progressbar</option>
</table>
</panel>
</row>
<row>
<panel>
<table>
<search base="base1">
<query>| fields *</query>
</search>
<option name="drilldown">none</option>
</table>
</panel>
</row>
</form>

 

 

 

 

 

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @FelixLeh,

if in the base search you haven't a streaming command (as stats or timechart) you have to list all the fields to use in the panels using the "fields" command, otherwise, your panels aren't populated.

Ciao.

Giuseppe

FelixLeh
Contributor

Thanks I didn't know that. Thought you'd have to transform it to get a result but I've checked it and you are absolutely correct! I will adjust my answer accordingly.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @asplunk789,

could you share your searches?

Anyway you have to find the common part of searches that you can put in the base search, possible using a streming command to reduce results, e.g. put in the base search the mainsearch and a stats command, then i each panel, you can filter results displaying only one or few values.

in the meantime, install and see the Splunk Dashboard Examples App (https://splunkbase.splunk.com/app/1603), where you can find a sampleabout post process search implementation.

Ciao.

Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...