Splunk Search

how to save calculated fields in index for faster results

disha
Contributor

I am getting events like _time,boxid,MemoryUsage(bytes),filed1,field2,..

I need to run the search something like
...|spath|rename BOXID as ID,MU as mu|eval mu1=round((mu/1024),2)|timechart limit=0 first(mu1) by ID

for last 7 days or more this chart take so much time to load. Can I calculate mu1 (memory usage in mb) and write the value to splunk in advance so that at the time of chart loading, I just read the value and display.

Please suggest.

Thanks,
Disha

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

Well, yes, of course.

Have a look at Accelerated Searches or Summary Indexing.

http://docs.splunk.com/Documentation/Splunk/5.0.2/Knowledge/Aboutsummaryindexing

Just saving the results of the calculation round((mu/1024),2) won't improve performance significantly.

/K

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...