<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Report Acceleration Summaries always stay 0% in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153934#M3443</link>
    <description>&lt;P&gt;Hi, i use Report Acceleration Summaries hope improve search speed. But always stay 0%, i search document seem not use "＊", i try delete dstip != 123.＊.＊.＊, but status the same. How should i do? &lt;/P&gt;

&lt;P&gt;my search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fg-1000c srcip !=1.1.1.1 dstip != 123.＊.＊.＊  
| fillnull value=SSL attack
|  eval bandwidth=rcvdbyte+sentbyte 
| eval bandwidth(MB) = round(bandwidth/1024/1024,2) 
| strcat " " time " " as Date | eval n = coalesce(hostname, host_name) |strcat " " n url " " as weburl 
| stats sum(bandwidth(MB)) as bandwidth(MB) values(srcip) as srcip values(attack) as app last(Date) as FirstDate first(Date) as LastDate values(weburl) as weburl by dstip 
| table srcip,dstip,app,FirstDate,LastDate,bandwidth(MB),weburl 
| sort bandwidth(MB) desc
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 06 May 2014 15:10:59 GMT</pubDate>
    <dc:creator>chengyu</dc:creator>
    <dc:date>2014-05-06T15:10:59Z</dc:date>
    <item>
      <title>Report Acceleration Summaries always stay 0%</title>
      <link>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153934#M3443</link>
      <description>&lt;P&gt;Hi, i use Report Acceleration Summaries hope improve search speed. But always stay 0%, i search document seem not use "＊", i try delete dstip != 123.＊.＊.＊, but status the same. How should i do? &lt;/P&gt;

&lt;P&gt;my search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fg-1000c srcip !=1.1.1.1 dstip != 123.＊.＊.＊  
| fillnull value=SSL attack
|  eval bandwidth=rcvdbyte+sentbyte 
| eval bandwidth(MB) = round(bandwidth/1024/1024,2) 
| strcat " " time " " as Date | eval n = coalesce(hostname, host_name) |strcat " " n url " " as weburl 
| stats sum(bandwidth(MB)) as bandwidth(MB) values(srcip) as srcip values(attack) as app last(Date) as FirstDate first(Date) as LastDate values(weburl) as weburl by dstip 
| table srcip,dstip,app,FirstDate,LastDate,bandwidth(MB),weburl 
| sort bandwidth(MB) desc
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 06 May 2014 15:10:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153934#M3443</guid>
      <dc:creator>chengyu</dc:creator>
      <dc:date>2014-05-06T15:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Report Acceleration Summaries always stay 0%</title>
      <link>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153935#M3444</link>
      <description>&lt;P&gt;I actually don't see how this search works at all...&lt;/P&gt;

&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fg-1000c srcip !=1.1.1.1 dstip != 123.＊.＊.＊  
| fillnull value="SSL" attack
| eval bandwidth=rcvdbyte+sentbyte 
| eval bandwidthMB = round(bandwidth/1024/1024,2) 
| strcat " " time " " as Date 
| eval n = coalesce(hostname, host_name) 
| strcat " " n url " " as weburl 
| stats sum(bandwidthMB) as bandwidthMB values(srcip) as srcip values(attack) as app earliest(Date) as FirstDate latest(Date) as LastDate values(weburl) as weburl by dstip 
| table srcip, dstip, app, FirstDate, LastDate, bandwidthMB, weburl 
| sort bandwidthMB desc
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also, realize that Splunk will not accelerate searches if there is insufficient data to justify the cost of acceleration.&lt;/P&gt;

&lt;P&gt;Searches that contain "not equals" will generally be slower than searches that use "equals". You are effectively asking Splunk to serially search every bucket in the time range of the search.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2014 01:46:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153935#M3444</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-05-07T01:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: Report Acceleration Summaries always stay 0%</title>
      <link>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153936#M3445</link>
      <description>&lt;P&gt;Hi, i search splunk document i find can't use command table must use chart, timechart, stats, and top...&lt;/P&gt;

&lt;P&gt;ＨＴＴＰ://docs.splunk.com/Documentation/Splunk/5.0.8/Knowledge/Manageacceleratedsearchsummaries&lt;/P&gt;

&lt;P&gt;I'm modify search, but always stay 0%...&lt;/P&gt;

&lt;P&gt;index=xxx&lt;BR /&gt;&lt;BR /&gt;
| fillnull value="SSL" attack&lt;BR /&gt;
| eval bandwidth=rcvdbyte+sentbyte &lt;BR /&gt;
| eval bandwidthMB = round(bandwidth/1024/1024,2) &lt;BR /&gt;
| strcat " " time " " as Date &lt;BR /&gt;
| eval n = coalesce(hostname, host_name) &lt;BR /&gt;
| strcat " " n url " " as weburl &lt;BR /&gt;
| stats sum(bandwidthMB) as bandwidthMB values(srcip) as srcip values(attack) as app earliest(Date) as FirstDate latest(Date) as LastDate values(weburl) as weburl by dstip &lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 03:34:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Report-Acceleration-Summaries-always-stay-0/m-p/153936#M3445</guid>
      <dc:creator>chengyu</dc:creator>
      <dc:date>2014-05-09T03:34:28Z</dc:date>
    </item>
  </channel>
</rss>

