Splunk Search

how can I make search much faster ?

perlish
Communicator

I want to search a string *xxx* in the field with 21G data using sourcetype="datafile" id="*xxx*"
how can I make search much fatser ?
Thank you !

0 Karma

MarioM
Motivator

if you know what fields you want to see in the results you could only include those in your search :

sourcetype="datafile" id="*xxx*" | fields + sourcetype id otherfields

it will stop splunk trying to extract the other fields thus displaying the results faster

dwaddle
SplunkTrust
SplunkTrust

Searching for wildcarded strings -- especially with a wildcard on both beginning and end -- are not going to be very fast. You can look at the search job inspector output and see if there is anything there to point you at a specific cause, but my suspicion is this is hard to solve.

Your best bet for making this search much faster is to throw much more hardware at the problem. Add several indexers and distribute the data/search across them. Faster disks would probably help, too.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...