Splunk Search

What are some of the "best practices" for utilizing Splunk's prediction algorithms?

sdorich
Communicator

I'm kind of new to using Splunk's built-in statistical algorithms. The following search works but is VERY inefficient (it takes 5+ minutes to even see the results). However, I know that these algorithms are complex so maybe this is "normal" but I wanted to see if the Splunk community knew of a way to make this search/computation more efficient. Thanks in advance.

eventtype=sitescope_cpu | timechart span=1m max(Value) as max_cpu | predict max_cpu | rename max_cpu as "Maximum CPU", prediction(max_cpu) as Prediction

Tags (2)

sanjay_shrestha
Contributor

If it is possible then using time range criteria (earliest, latest) might help to expedite search.

0 Karma

sanjay_shrestha
Contributor

Your search looks good to me. It would be helpful to create summary index in the situation when query is taking longer than desired time and populate that with savedsearch in regular interval.

sdorich
Communicator

Well I've tried many ranges but the performance isn't excellent. Obviously the shorter the time range the faster the search but I was just checking with the Splunk community for suggestions regarding my actual search (i.e. can this search be any more efficient or is this the best possible way to get the results I want?)

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...