Splunk Search

field location in log effect search completion time

jerrythoms
Explorer

Noticing a big difference in time it takes to do a search on 2 different fields in a log. Is this just due to the slower one being at the end of the log? Its a firewall log (CIM)

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about the two fields. Share the two queries, if you can.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jerrythoms
Explorer

just noticed a big difference it took to search for an dst ip verses a source ip. Basic query
index=firewall dst="xxx.xxx.xxx.xxx"
vs
index=firewall src="xxx.xxx.xxx.xxx"

It takes a lot longer for the search to complete for the src . I noticed that src was at the end of the log. I was wondering if that is the reason

0 Karma
Get Updates on the Splunk Community!

Data Preparation Made Easy: SPL2 for Edge Processor

By now, you may have heard the exciting news that Edge Processor, the easy-to-use Splunk data preparation tool ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Tips & Tricks When Using Ingest Actions

Tune in to learn about:Large scale architecture when using Ingest ActionsRegEx performance considerations ...