Splunk Search

Adding new fields to existing records

omend
Path Finder

Hi All,

I have inserted my raw data into Splunk. The data contains many records on sales statistics of different store branches. The data is in a format of "Date" "Branch_ID" "Sales in USD".

I would like to add new fields to each of these records.
For example, I would like to give score (based on a specific statistical algorithm of my choice) for each sales day, so the data should ideally look like "Date" "Branch_ID" "Sales in USD" "Score".

What should be the right approach to this issue?
On the one hand, I don't want to run the score function in real-time upon each search since it is quite heavy on performance. On the other hand, I would prefer not to duplicate all my data due to this enrichment.
As I understand, it is not possible to update fields on existing records. Is it true? Is the best thing to do is to run the score function and use the "collect" command to re-index the new records?

Thanks,
Ori.

Tags (1)
0 Karma

asimagu
Builder

have you considered using an automatic lookup??

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...