Splunk Search

Best practice dedup: should I use it as early as possible, or postpone it since it is non-streaming?

rvsroe
Explorer

In the fundamentals 1 course lab 8 tells us to:
"As a best practice and for best performance, place dedup as early in the search as possible." (page 4)

But the quick refence guide tells us that:
"Postpone commands that process over the entire result set (non-streaming commands) as late as possible in your search. Some of these commands are: dedup, sort, and stats" (page2)

the example command they give in lab 8 places dedup in front of the distributable streaming command 'rename':
index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do"
| dedup JSESSIONID
| table JSESSIONID, action, status
| rename JSESSIONID as UserSessions

Would it not make sense to place dedup after rename? I guess 'as early as possible' is ambiguous anyways, but any input on where to place dedup would be greatly appreciated,

Cheers,
Roelof

Tags (1)
0 Karma
1 Solution

koshyk
Super Champion

The best way to tackle the above query is

index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do" 
| stats count by JSESSIONID, action, status
| rename JSESSIONID as UserSessions

stats or dedup is much efficient and reduce the data as much as possible before you do field level manipulations
you do a statistical reduction as early as possible in your search

View solution in original post

koshyk
Super Champion

The best way to tackle the above query is

index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do" 
| stats count by JSESSIONID, action, status
| rename JSESSIONID as UserSessions

stats or dedup is much efficient and reduce the data as much as possible before you do field level manipulations
you do a statistical reduction as early as possible in your search

satyenshah
Path Finder

I believe this answer is not quite correct.  The optimized query is:

index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do" 
| table JSESSIONID, action, status
| stats count by JSESSIONID, action, status
| rename JSESSIONID as UserSessions

 

In a clustered Splunk environment, lines 1-2 execute in parallel on your indexers, the minimized data is then passed to the searchhead, and the searchhead executes line 3, and then line 4 only operates on 1 row of data.

I try to always do a TABLE early in the qeury especially before doing an expensive DEDUP, STATS, or BIN.  That reduces the dataset on all your indexers, discarding unneeded fields, before it's merged on your searchead.  Instead of TABLE you could alternately do two FIELDS commands, one to include the necessary fields and another to remove _raw.  Computationally I don't know whether Splunk is more efficient handling event data from FIELDS or handling transformed data from TABLE, but TABLE makes the query simpler.

0 Karma

isoutamo
SplunkTrust
SplunkTrust

You have messed with table and fields. You should never use table before stats etc. As table always move processing into SH side. So you should do

index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do" 
| fields JSESSIONID, action, status
| stats count by JSESSIONID, action, status
| rename JSESSIONID as UserSessions

This can use several indexers to do preliminary phase of stats, then send smaller result sets to SH which finally combine those to give true result of stats. 

satyenshah
Path Finder

I didn't realize that table forces localop.  So, optimizing further would be:

index=main sourcetype="access_combined_wcookie" action=purchase status=200 file="success.do" 
| fields - _*
| fields JSESSIONID, action, status
| stats count by JSESSIONID, action, status
| rename JSESSIONID as UserSessions

to discard _raw and other internal fields.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

It makes no sense to fiddle with fields since you're gonna do stats next.

For example, performance of

search index=_internal 
| stats count by sourcetype

and

search index=_internal 
| fields - _*
| fields sourcetype
| stats count by sourcetype

is practically identical.

The only difference in those commands is that one has this in map phase:

litsearch index=_internal
| addinfo type=count label=prereport_events track_fieldmeta_events=true
| fields keepcolorder=t "prestats_reserved_*" "psrsvd_*" "sourcetype"
| prestats count by sourcetype

While the other has this:

litsearch index=_internal
| fields - "_*"
| fields + sourcetype
| addinfo type=count label=prereport_events track_fieldmeta_events=true
| fields keepcolorder=t "prestats_reserved_*" "psrsvd_*" "sourcetype"
| prestats count by sourcetype

The two fields commands in the "better" version are actually pointless since right before prestats Splunk does its own fields command which limits the data to the fields taking part in aggregation anyway.

0 Karma

rvsroe
Explorer

Hi Koshyk,
Thank you for the quick reply, just a follow up: this means that if I rename before stats or dedup it would take more time? And this would be the case since it is renaming over a larger dataset than if it was excuted after stats/dedup?

0 Karma
Get Updates on the Splunk Community!

Announcing the Expansion of the Splunk Academic Alliance Program

The Splunk Community is more than just an online forum — it’s a network of passionate users, administrators, ...

Learn Splunk Insider Insights, Do More With Gen AI, & Find 20+ New Use Cases You Can ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Buttercup Games: Further Dashboarding Techniques (Part 7)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...