<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: summary index event date and sourcetype in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14718#M76</link>
    <description>&lt;P&gt;High level goal: I want to report(dashboard/charts/tables) on a specific bunch of fields extracted (used nasty regex) from a fairly sizable index.   The idea was that a summary index pulling only the fields i need would be smarter to dashboard off of...&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jun 2010 01:32:41 GMT</pubDate>
    <dc:creator>hiddenkirby</dc:creator>
    <dc:date>2010-06-03T01:32:41Z</dc:date>
    <item>
      <title>summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14716#M74</link>
      <description>&lt;P&gt;when i create a summary index for the speed benefit and to filter results there are two main things i lose. &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;P&gt;Each event then(after summary indexing) has a new date of when the &lt;B&gt;summary index&lt;/B&gt; was created ...no longer the original event date. &lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;The sourcetype=stash now... instead of the original sourcetype.&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Is there anyway around this? a way to Pass this through per event?&lt;/P&gt;

&lt;P&gt;apologies if this was cryptic.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 01:05:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14716#M74</guid>
      <dc:creator>hiddenkirby</dc:creator>
      <dc:date>2010-06-03T01:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14717#M75</link>
      <description>&lt;P&gt;Yeah, it's a bit cryptic.  More details would be helpful.  It sounds like summary indexing is working the way it was intended to.  If you provide more details about what you are trying to do it would be helpful.  It could be that summary indexing isn't the best fit for your usage case.  What level of event reduction are you able to achieve?  (What's the ratio of input events equals to summary events?)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 01:13:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14717#M75</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-06-03T01:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14718#M76</link>
      <description>&lt;P&gt;High level goal: I want to report(dashboard/charts/tables) on a specific bunch of fields extracted (used nasty regex) from a fairly sizable index.   The idea was that a summary index pulling only the fields i need would be smarter to dashboard off of...&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 01:32:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14718#M76</guid>
      <dc:creator>hiddenkirby</dc:creator>
      <dc:date>2010-06-03T01:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14719#M77</link>
      <description>&lt;P&gt;to extend a bit on that... the idea was since the summary index had an aggregate(stats values) distinct showing of values i could select on... i could drill into a list of events with that field=value in them.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 02:57:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14719#M77</guid>
      <dc:creator>hiddenkirby</dc:creator>
      <dc:date>2010-06-03T02:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14720#M78</link>
      <description>&lt;P&gt;The summary indexing process will use &lt;CODE&gt;_time&lt;/CODE&gt; for the event's timestamp if &lt;CODE&gt;_time&lt;/CODE&gt; is a field that exists in your results.  (As per &lt;A href="http://answers.splunk.com/questions/1296/how-does-summary-indexing-handle-time" rel="nofollow"&gt;How does summary indexing handle time?&lt;/A&gt;.)  But in the normal case of using some stats-like command, you don't often keep the &lt;CODE&gt;_time&lt;/CODE&gt; field around so the summary index process falls back to the time of your search.&lt;/P&gt;

&lt;P&gt;If you want to use one of the &lt;CODE&gt;stats&lt;/CODE&gt; commands and you want a better time breakdown, you could look at using &lt;CODE&gt;bucket&lt;/CODE&gt; command and set &lt;CODE&gt;span&lt;/CODE&gt; to something less than the interval of your saved search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | bucket _time span=5m | stats avg(thruput) by _time host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(You may also find &lt;CODE&gt;sitimechart&lt;/CODE&gt; helpful here, but I've generally avoided all the &lt;CODE&gt;si*&lt;/CODE&gt; helper commands and handled the funky statistical corner cases myself rather than let splunk do it.  I've seen some of the &lt;CODE&gt;si*&lt;/CODE&gt; command produce more "summary" events than I had input events... which is a step backwards!)&lt;/P&gt;

&lt;P&gt;With &lt;CODE&gt;bucket&lt;/CODE&gt; or &lt;CODE&gt;(si)?timechart&lt;/CODE&gt;, you will still not have the exact &lt;CODE&gt;_time&lt;/CODE&gt; of the original event, but that's rather central to how summary indexing works.  I suppose you could do a &lt;CODE&gt;| stats min(_time) as _time by field&lt;/CODE&gt; but you will still only keep one timestamp from your groups of events... the bottom line is that you can't keep the exact same timestamp of all your events without duplicating all your events, which then defeats the purpose of summary indexing....&lt;/P&gt;

&lt;P&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;

&lt;P&gt;In terms of keeping &lt;CODE&gt;sourcetype&lt;/CODE&gt;.  You can't (or should) do it.  In splunk 4.x, the summary indexing process does now set &lt;CODE&gt;source&lt;/CODE&gt; to the name of your saved search.  You still have a copy of the savedsearch in the event itself called search_name, but searching against &lt;CODE&gt;source&lt;/CODE&gt; (since it's one of the primary indexed fields) is really fast.  So I would just suggest that you leverage that instead.  You still don't have a great drill down option with this, but it's possible.  (You can let the &lt;CODE&gt;sourcetype&lt;/CODE&gt; field go to your summary index, but it get's renamed &lt;CODE&gt;orig_sourcetype&lt;/CODE&gt; which I suppose you could then leverage for drilldown purposes.)  I suppose you could make a &lt;CODE&gt;TRANSFORMS&lt;/CODE&gt; entry on the &lt;CODE&gt;stash&lt;/CODE&gt; sourcetype that would look for &lt;CODE&gt;orig_sourcetype&lt;/CODE&gt; in your event and then assign the sourcetype to that value, but that just seems like a bad idea....&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 03:54:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14720#M78</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-06-03T03:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14721#M79</link>
      <description>&lt;P&gt;BTW.  It may be more helpful to add to your original question (by using the "edit" feature) rather than using comments.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 03:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14721#M79</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-06-03T03:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14722#M80</link>
      <description>&lt;P&gt;Yeah, just use 'orig_sourcetype' if you need it. Similarly, the 'host' is usually set to 'orig_host'.&lt;/P&gt;

&lt;P&gt;It is often useful to store &lt;CODE&gt;min(_time)&lt;/CODE&gt; and &lt;CODE&gt;max(_time)&lt;/CODE&gt; in aggregates (but again only one of each per aggregate) for purposes of weighting values by time intervals, where events are less regular than bucketed time spans.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 09:13:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14722#M80</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2020-09-28T09:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: summary index event date and sourcetype</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14723#M81</link>
      <description>&lt;P&gt;&lt;CODE&gt;I've generally avoided all the si* helper commands and handled the funky statistical corner cases myself&lt;/CODE&gt; - Is there a writeup anywhere on what these cases are, or even what the si* commands do?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2011 22:33:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/summary-index-event-date-and-sourcetype/m-p/14723#M81</guid>
      <dc:creator>Jason</dc:creator>
      <dc:date>2011-03-31T22:33:34Z</dc:date>
    </item>
  </channel>
</rss>

