Splunk Enterprise

index investigation

Kenny_splunk
Path Finder

So we are starting a new project soon, and basically our boss is personally sending me an index (not internal) to investigate.


Investigate as far as as far as usage. We are trying to optimize the env and cut whats not being used, or checking to see what is being overused. KO'S, data intake, etc.


Any good practices, processes or tips you can lend? this would be the most perfect learning opportunity. Im excited, but nervous.

Labels (1)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @Kenny_splunk 

I think the best place to start here is by checking the _audit index to see who is using/searching aginst the index in question...

Start off with the following query and take it from there:

index=_audit search="*<yourIndexName>*" info=completed action=search

Its important to remember, however, than some people might search for index=* in order to access a particular index, which might not come up in the above search. They might also use something like win* instead of win_events. 
People can use index="yourName", index=yourName, index IN (yourName,anotherName) etc etc which is why I included the wildcards either side for the above sample query. You might want to tune to your environment etc as you see fit!

In these logs you should find a number of useful fields, such as "search" (what they ran) and "user" (Who ran it) amonst other things llike event_count and result_count.

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

kiran_panchavat
SplunkTrust
SplunkTrust

@Kenny_splunk 

  • Find sourcetypes that are consuming a lot of data, especially unnecessary logs
  • Reduce retention or delete them if they are no longer needed.
  • If multiple indexes contain similar data, consolidate where possible.

 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!

kiran_panchavat
SplunkTrust
SplunkTrust

@Kenny_splunk 

Use the tstats command to track index usage over time. This will help you identify peaks and patterns in data usage.

kiran_panchavat_0-1739378932220.png

  • Review and adjust your index retention policies to ensure that data is stored only for as long as needed. This can help reduce storage costs.
  • Review saved searches and reports to ensure they are still relevant and being used. Disable or delete those that are not needed.
  • Optimize your searches by using efficient search commands and avoiding unnecessary subsearches. Use summary indexing and data models for faster results.

Index Usage Over Time:

 

kiran_panchavat_1-1739379010286.png

 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...