Splunk Search

Optimizing metrics based searches?

auzelevski
Explorer

Hello,

I have the following query in one of the panels in my dashboard.

 

 

 

| mstats p95(prometheus.container_memory_working_set_bytes) as p95_memory_bytes span=1m where pod=sf-mcdata--hydration-worker* AND stack=$stackLower$ by stack
| stats min(p95_memory_bytes) as min_p95_memory_bytes by _time
| timechart span=1m count as Availability
| eval Span=1
              | stats sum(Availability) as totalAvailability, sum(Span) as totalSpans
              | eval AvailabilityPercent = 100*(totalAvailability/ totalSpans)
              | fields AvailabilityPercent

 

 

 

There are some stacks that return too many events for this metric and this causes a timeout and then the search fails.

Is there a way to optimize this query to work with a lot of events?

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Enhance Your Splunk App Development: New Tools & Support

UCC FrameworkAdd-on Builder has been around for quite some time. It helps build Splunk apps faster, but it ...

Prove Your Splunk Prowess at .conf25—No Prereqs Required!

Your Next Big Security Credential: No Prerequisites Needed We know you’ve got the skills, and now, earning the ...

Splunk Observability Cloud's AI Assistant in Action Series: Observability as Code

This is the sixth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...