<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: report acceleration - memory usage in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309161#M5681</link>
    <description>&lt;P&gt;To add on to cmerriman's comment, following is the documentation on performing stats first and then lookup: &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Lookup#Optimizing_your_lookup_search"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Lookup#Optimizing_your_lookup_search&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Following rename can be moved to later part of the query (after stats), possibly the final command for formatting.   &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rename SubjectUserSid as user, NewProcessName as process
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;PS: You do not need to match field names to perform lookup:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| lookup whitelist_win process  AS NewProcessName
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 11 Jul 2017 12:01:25 GMT</pubDate>
    <dc:creator>niketn</dc:creator>
    <dc:date>2017-07-11T12:01:25Z</dc:date>
    <item>
      <title>report acceleration - memory usage</title>
      <link>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309159#M5679</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am looking for answer to two questions:&lt;/P&gt;

&lt;P&gt;1) How command &lt;CODE&gt;| savedsearch&lt;/CODE&gt; provides results if the report has time input, and I select wider range in my query?&lt;BR /&gt;
This report defaults to Last 24 hours with search, and has 3 months accelerated.&lt;/P&gt;

&lt;P&gt;2) How to debug extremly high memory usage (over 12 GB) on searchhead if I start a query and run it for last 30 days?&lt;/P&gt;

&lt;P&gt;Report search looks like: &lt;CODE&gt;index="wineventlog" host=* (EventID=4688 OR EventID=861) NewProcessName=* SubjectUserName=* | rename SubjectUserSid as user,  NewProcessName as process | lookup whitelist_win process | fillnull active | stats sparkline(count) AS timeline, max(active) AS active by host, user, process&lt;/CODE&gt;&lt;BR /&gt;
My search which use this report is &lt;CODE&gt;| savedsearch "WinRunningApps"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;This lookup is small, and has a wildcard matching.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 11:34:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309159#M5679</guid>
      <dc:creator>lukasz92</dc:creator>
      <dc:date>2017-07-11T11:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: report acceleration - memory usage</title>
      <link>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309160#M5680</link>
      <description>&lt;P&gt;for the time range portion, if you select a new time range in the time picker, it overrides the range saved in the saved search. you can see that under &lt;STRONG&gt;Time ranges&lt;/STRONG&gt; in the documentation&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/6.6.2/SearchReference/Savedsearch"&gt;https://docs.splunk.com/Documentation/Splunk/6.6.2/SearchReference/Savedsearch&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;one thing that might help make this more efficient is to aggregate the results before the lookup, if possible. you're joining your lookup to every single event, if you could narrow the number of rows it had to join to, that might help.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 11:50:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309160#M5680</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2017-07-11T11:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: report acceleration - memory usage</title>
      <link>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309161#M5681</link>
      <description>&lt;P&gt;To add on to cmerriman's comment, following is the documentation on performing stats first and then lookup: &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Lookup#Optimizing_your_lookup_search"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Lookup#Optimizing_your_lookup_search&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Following rename can be moved to later part of the query (after stats), possibly the final command for formatting.   &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rename SubjectUserSid as user, NewProcessName as process
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;PS: You do not need to match field names to perform lookup:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| lookup whitelist_win process  AS NewProcessName
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 11 Jul 2017 12:01:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/report-acceleration-memory-usage/m-p/309161#M5681</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-07-11T12:01:25Z</dc:date>
    </item>
  </channel>
</rss>

