Splunk Search

field location in log effect search completion time

jerrythoms
Explorer

Noticing a big difference in time it takes to do a search on 2 different fields in a log. Is this just due to the slower one being at the end of the log? Its a firewall log (CIM)

Tags (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please tell us more about the two fields. Share the two queries, if you can.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jerrythoms
Explorer

just noticed a big difference it took to search for an dst ip verses a source ip. Basic query
index=firewall dst="xxx.xxx.xxx.xxx"
vs
index=firewall src="xxx.xxx.xxx.xxx"

It takes a lot longer for the search to complete for the src . I noticed that src was at the end of the log. I was wondering if that is the reason

0 Karma
Get Updates on the Splunk Community!

Out of the Box to Up And Running - Streamlined Observability for Your Cloud ...

  Tech Talk Streamlined Observability for Your Cloud Environment Register    Out of the Box to Up And Running ...

Splunk Smartness with Brandon Sternfield | Episode 3

Hello and welcome to another episode of "Splunk Smartness," the interview series where we explore the power of ...

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...