Hi @abazgwa21cz,
let me understand: whay do you want to accelerate your search, is it very slow?
in this case, you could schedue your search to run on a more short time period (so it uses less data and it's faster) then this scheduled search saves results in a summary index and you can search on the summary, having in this vary very high performances.
Ciao.
Giuseppe
Thanks for your answer
when i create alert from my search, it seem spam like this
and it maybe accumulated with previous result
So i now i want to search in range each 2 hours, and export sum of data user sent in 2 hours
how can i fix this
Hi @abazgwa21cz,
sorry I wasn't clear, you have to add to the end of your search the command " | collect index=<your_summary_index>" (you have also to before creating te summary index) and schedule it e.g. every hour,
then you can run the search on the summary index.
You can find information about this at
https://docs.splunk.com/Documentation/SplunkCloud/9.0.2209/Knowledge/Usesummaryindexing
Ciao.
Giuseppe