Splunk Search

field location in log effect search completion time

jerrythoms
Explorer

Noticing a big difference in time it takes to do a search on 2 different fields in a log. Is this just due to the slower one being at the end of the log? Its a firewall log (CIM)

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about the two fields. Share the two queries, if you can.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jerrythoms
Explorer

just noticed a big difference it took to search for an dst ip verses a source ip. Basic query
index=firewall dst="xxx.xxx.xxx.xxx"
vs
index=firewall src="xxx.xxx.xxx.xxx"

It takes a lot longer for the search to complete for the src . I noticed that src was at the end of the log. I was wondering if that is the reason

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...