Splunk Search

field location in log effect search completion time

jerrythoms
Explorer

Noticing a big difference in time it takes to do a search on 2 different fields in a log. Is this just due to the slower one being at the end of the log? Its a firewall log (CIM)

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about the two fields. Share the two queries, if you can.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jerrythoms
Explorer

just noticed a big difference it took to search for an dst ip verses a source ip. Basic query
index=firewall dst="xxx.xxx.xxx.xxx"
vs
index=firewall src="xxx.xxx.xxx.xxx"

It takes a lot longer for the search to complete for the src . I noticed that src was at the end of the log. I was wondering if that is the reason

0 Karma
Get Updates on the Splunk Community!

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

Investigate Security and Threat Detection with VirusTotal and Splunk Integration

As security threats and their complexities surge, security analysts deal with increased challenges and ...