Splunk Enterprise

index investigation

Kenny_splunk
Path Finder

So we are starting a new project soon, and basically our boss is personally sending me an index (not internal) to investigate.


Investigate as far as as far as usage. We are trying to optimize the env and cut whats not being used, or checking to see what is being overused. KO'S, data intake, etc.


Any good practices, processes or tips you can lend? this would be the most perfect learning opportunity. Im excited, but nervous.

Labels (1)
0 Karma

livehybrid
Champion

Hi @Kenny_splunk 

I think the best place to start here is by checking the _audit index to see who is using/searching aginst the index in question...

Start off with the following query and take it from there:

index=_audit search="*<yourIndexName>*" info=completed action=search

Its important to remember, however, than some people might search for index=* in order to access a particular index, which might not come up in the above search. They might also use something like win* instead of win_events. 
People can use index="yourName", index=yourName, index IN (yourName,anotherName) etc etc which is why I included the wildcards either side for the above sample query. You might want to tune to your environment etc as you see fit!

In these logs you should find a number of useful fields, such as "search" (what they ran) and "user" (Who ran it) amonst other things llike event_count and result_count.

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

kiran_panchavat
Influencer

@Kenny_splunk 

  • Find sourcetypes that are consuming a lot of data, especially unnecessary logs
  • Reduce retention or delete them if they are no longer needed.
  • If multiple indexes contain similar data, consolidate where possible.

 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!

kiran_panchavat
Influencer

@Kenny_splunk 

Use the tstats command to track index usage over time. This will help you identify peaks and patterns in data usage.

kiran_panchavat_0-1739378932220.png

  • Review and adjust your index retention policies to ensure that data is stored only for as long as needed. This can help reduce storage costs.
  • Review saved searches and reports to ensure they are still relevant and being used. Disable or delete those that are not needed.
  • Optimize your searches by using efficient search commands and avoiding unnecessary subsearches. Use summary indexing and data models for faster results.

Index Usage Over Time:

 

kiran_panchavat_1-1739379010286.png

 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...