EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
Splunk bangalore user group 2020 08 01
1. Bengaluru User
Group
WELCOME
1st Aug 2020
स्वागत
স্বাগত
ಸ್ವಾಗತ
स्वागत आहे
స్వాగతவரவவற்பு
സ്വാഗതം
ਸਵਾਗਤ ਹੈ
સ્વાગત છે
آمدید خوش
ସ୍ୱାଗତ
آیا ڪري ڀلي
3. Housekeeping
Join #splunk_bengaluru_usergroup on Slack http://splk.it/slack
Use #splunk_bengaluru_usergroup for Q&A during the session
Please keep your lines muted when not speaking
Slides, recording & feedback form will be posted to the Events page
Splunk Bengaluru User Group
https://usergroups.splunk.com/bengaluru-splunk-user-group/
13. What I should Avoid?
Avoid Why? Should do
All time • Events are stored in time-series order
• Reduce searched bucket by being specific
• Use Specific time range
• Narrow the time range as much as
possible
index=* • Events are grouped into indexes
• Reduce searches buckets by specifying an index.
• Specify an index in the search
wildcards • Wildcards are not compatible with Bloom Filters
• Wildcard matching to term in the index takes time
• Varying levels of pain
1. myterm*: Not great
2. *myterm: Bad
3. *myterm*: Death
• Use the OR Operator
1. myterm1 OR myterm2…
14. What I should Avoid?
Avoid Why? Should do
NOT
!=
• Bloom Filters & indexes are designed to quickly locate
terms that exist
• Searching for that term which not exists takes longer
• Use AND/OR operators
Verbose Search Mode • Verbose search mode causes full event data to be sent
to the search head, even if isn’t needed.
• Use Smart Mode or Fast Mode
Real-time Searches • RT searches put an increased load on search head and
indexer
• Use a scheduled search that occurs
more frequently
Joins / Sub-searches • This is intensive search command • Use the stats (preferred)
Search after first pipe • Filtering search results using a second | search
command in your query is inefficient
• As much as possible, add all filtering
criteria before the first |
25. NOT NOTs OR !=
index=_internal NOT log_level=INFO | stats
count by log_level
index=_internal log_level!=INFO | stats
count by log_level
index=_internal log_level IN
("ERROR","WARN","WARNING") | stats
count by log_level
Weak Strong
Faster Searching
46. We plan to meet 1st Saturday of every month at 11:00 AM IST.
Please provide feedback for :
• Sessions and improvements.
• Topics to be covered in future sessions.
• Let us know if you are interested in presenting in User Group.
Keep the comradery through Slack and Splunk Answers>
What’s Next
http://splk.it/slack http://community.splunk.com
https://conf.splunk.com
Splunk .Conf 2020 registrations are open: Oct 20th and 21st (Virtual)