Splunk Search

Multiple summary indexes

mansel_scheffel
Explorer

Hi,

I need to schedule daily jobs for summary indexing.. There are 6 of the same jobs (licence usage over a month(3) & day(3) for 3 separate indexes that populate a dashboard). I was thinking of scheduling the monthly usage to run daily, and daily usage to run each hour?

Should I create a separate summary index for each of the 6?

Do they all need to run at separate times (set schedule window)?

Thanks

0 Karma
1 Solution

Jeremiah
Motivator

You can create a separate summary index if you want to, but you probably don't need to. You create a new summary index for generally the same reasons you create a new index: access control, retention period, and volume.

In our case, we have most summary searches all writing to the same summary index, and then separate summary indexes for 1) very high volume summarizations (millions of events per day), and 2) summarizations of events from security indexes.

It sounds like you have 6 jobs, but you might only need two. You should be able to consolidate the searches and then use the fields in the summary data at search time to create each dashboard. You can stagger the searches and/or use the window option to schedule the searches so the load distributes more evenly.

Also be mindful of your search interval vs your search time range. If you are summarizing, they probably should be equal. If I was going to create a monthly report, for example, I'd probably schedule the search to run daily and summarize the previous day's events. Then in my dashboard, I'd use those daily values to build a monthly total.

View solution in original post

Jeremiah
Motivator

You can create a separate summary index if you want to, but you probably don't need to. You create a new summary index for generally the same reasons you create a new index: access control, retention period, and volume.

In our case, we have most summary searches all writing to the same summary index, and then separate summary indexes for 1) very high volume summarizations (millions of events per day), and 2) summarizations of events from security indexes.

It sounds like you have 6 jobs, but you might only need two. You should be able to consolidate the searches and then use the fields in the summary data at search time to create each dashboard. You can stagger the searches and/or use the window option to schedule the searches so the load distributes more evenly.

Also be mindful of your search interval vs your search time range. If you are summarizing, they probably should be equal. If I was going to create a monthly report, for example, I'd probably schedule the search to run daily and summarize the previous day's events. Then in my dashboard, I'd use those daily values to build a monthly total.

Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...