Splunk Search

field location in log effect search completion time

jerrythoms
Explorer

Noticing a big difference in time it takes to do a search on 2 different fields in a log. Is this just due to the slower one being at the end of the log? Its a firewall log (CIM)

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about the two fields. Share the two queries, if you can.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jerrythoms
Explorer

just noticed a big difference it took to search for an dst ip verses a source ip. Basic query
index=firewall dst="xxx.xxx.xxx.xxx"
vs
index=firewall src="xxx.xxx.xxx.xxx"

It takes a lot longer for the search to complete for the src . I noticed that src was at the end of the log. I was wondering if that is the reason

0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...