Monitoring Splunk

Does defining an eventtype improve performance?

BradL
Path Finder

Is there a performance difference between searching for this:

index=foo host=XXXX "a text string bar"

vs.
defining an eventtype bar_event:

index=foo "a text string bar"

and then searching for this:

index=foo host=XXXX eventtype=bar_event

?

I'm wondering if the eventtype definition causes the generation of any additional indexing data to speed up the search.

Tags (2)
1 Solution

chanfoli
Builder

I do not believe so since eventtypes are just replacing regular search language, but hey, did you know that you can always use the job inspector to check into such things with your own searches and data? It is a pretty cool tool.

View solution in original post

chanfoli
Builder

I do not believe so since eventtypes are just replacing regular search language, but hey, did you know that you can always use the job inspector to check into such things with your own searches and data? It is a pretty cool tool.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...

Customer success is front and center at .conf25

Hi Splunkers, If you are not able to be at .conf25 in person, you can still learn about all the latest news ...