<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk problem with fast and smart mode in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384818#M112386</link>
    <description>&lt;P&gt;That is how &lt;CODE&gt;fast&lt;/CODE&gt; and &lt;CODE&gt;smart&lt;/CODE&gt; mode work!  They are faster because either they create NO extra fields ( &lt;CODE&gt;fast&lt;/CODE&gt; ) or only the ones that you explicitly use in your search ( &lt;CODE&gt;smart&lt;/CODE&gt; ).  In your case, you only reference &lt;CODE&gt;count&lt;/CODE&gt; and your &lt;CODE&gt;by&lt;/CODE&gt; field, so that is all that is available on the &lt;CODE&gt;Events&lt;/CODE&gt; tab.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2019 05:08:51 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2019-03-08T05:08:51Z</dc:date>
    <item>
      <title>Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384814#M112382</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;

&lt;P&gt;I am facing a problem ,I have an instance of splunk installed on linux server , And I am trying to do a copy of this instance on my localhost which turns on windows machine.So I have done copy of all my apps and indexes.But I find out that while doing my requests, search commands like stats, timechart ....are working only in verbose mode, And they are returning no data in fast and smart mode. &lt;/P&gt;

&lt;P&gt;Any help please,&lt;/P&gt;

&lt;P&gt;N.B. : -Version splunk on linux  :      7.2.0                                       -Version splunk on my local machine : 7.2.3 &lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6539i5ECD8B8CB0B3C66E/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6540i3B223AD17E52C613/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 16:31:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384814#M112382</guid>
      <dc:creator>virtuosoo</dc:creator>
      <dc:date>2019-02-15T16:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384815#M112383</link>
      <description>&lt;P&gt;Are you on the events tab? Commands like stats and timechart will return &lt;EM&gt;statistics&lt;/EM&gt; and &lt;EM&gt;events&lt;/EM&gt; in Verbose Mode but only &lt;EM&gt;statistics&lt;/EM&gt; in fast and smart mode.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 16:56:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384815#M112383</guid>
      <dc:creator>pkeenan87</dc:creator>
      <dc:date>2019-02-15T16:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384816#M112384</link>
      <description>&lt;P&gt;Thank you for your reply,&lt;/P&gt;

&lt;P&gt;I have updated the issue by uploading  Images to show the problem.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 10:51:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384816#M112384</guid>
      <dc:creator>virtuosoo</dc:creator>
      <dc:date>2019-02-18T10:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384817#M112385</link>
      <description>&lt;P&gt;Hi!&lt;BR /&gt;
Try to add  &lt;CODE&gt;| fields * |&lt;/CODE&gt;  before your stats.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:49:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384817#M112385</guid>
      <dc:creator>jgallo92</dc:creator>
      <dc:date>2019-02-26T14:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384818#M112386</link>
      <description>&lt;P&gt;That is how &lt;CODE&gt;fast&lt;/CODE&gt; and &lt;CODE&gt;smart&lt;/CODE&gt; mode work!  They are faster because either they create NO extra fields ( &lt;CODE&gt;fast&lt;/CODE&gt; ) or only the ones that you explicitly use in your search ( &lt;CODE&gt;smart&lt;/CODE&gt; ).  In your case, you only reference &lt;CODE&gt;count&lt;/CODE&gt; and your &lt;CODE&gt;by&lt;/CODE&gt; field, so that is all that is available on the &lt;CODE&gt;Events&lt;/CODE&gt; tab.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 05:08:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384818#M112386</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-08T05:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384819#M112387</link>
      <description>&lt;P&gt;I have the same issue as @virtuosoo and I confirm the issue seems not directly related to the SMART or VERBOSE mode.&lt;/P&gt;

&lt;P&gt;Let's take a more classic case:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit | stats count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We will all agree that it should work even in SMART or FAST mode. Because as per the documentation, field discovery doesn't occur (as per @woodcock message) but metafields are always "discovered" (such as sourcetype, source, etc.). As a result, we should expect a result to the command above.&lt;/P&gt;

&lt;P&gt;When this command is executed on a &lt;STRONG&gt;Splunk running on Windows&lt;/STRONG&gt;, we have 0 results. Same command on a Splunk running on Linux gives the expected number. The same command in VERBOSE mode gives the expected result on both environments.&lt;/P&gt;

&lt;P&gt;If I update the command as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit | head 1000 | stats count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Even in SMART/VERBOSE mode on Windows, I get "1000". Here, I assume that the "head" command forces the field discovery in a way...&lt;/P&gt;

&lt;P&gt;How can we explain that the behavior differs from a Splunk running on Windows compared to a Splunk running on Linux ?&lt;/P&gt;

&lt;P&gt;Please help.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 09:33:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384819#M112387</guid>
      <dc:creator>ecoquelin</dc:creator>
      <dc:date>2019-03-13T09:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk problem with fast and smart mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384820#M112388</link>
      <description>&lt;P&gt;Still looking for an answer as this problem can not be explained.&lt;/P&gt;

&lt;P&gt;Going through the logs, we noticed that between Linux and Windows, the search log differs:&lt;/P&gt;

&lt;P&gt;On Linux, I have&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  CMBucketId - CMIndexId: New indexName=&lt;EM&gt;audit inserted, mapping to id=2&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  BatchSearch - index: _audit dbsize=1&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  UnifiedSearch - Initialization of search data structures took 6 ms&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  UnifiedSearch - Processed search targeting arguments&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  StatsProcessor - No group-by fields specified, incompatible for high cardinality improvements&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  LocalCollector - Final required fields list = _subsecond,index,prestats_reserved&lt;/EM&gt;&lt;EM&gt;,psrsvd_&lt;/EM&gt;&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  UserManager - Unwound user context: ecoquelin -&amp;gt; NULL&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  UserManager - Setting user context: ecoquelin&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  UserManager - Done setting user context: NULL -&amp;gt; ecoquelin&lt;BR /&gt;
    03-21-2019 18:43:56.676 INFO  BatchSearch - Searching index:_audit with LISPY:'[ AND ]'&lt;BR /&gt;
    03-21-2019 18:43:56.686 INFO  SearchOperator:kv - no fields required. Running only non-optimizeable extractions ...&lt;BR /&gt;
    03-21-2019 18:43:56.700 INFO  UserManager - Unwound user context: ecoquelin -&amp;gt; NULL&lt;/P&gt;

&lt;P&gt;On Windows, I have&lt;BR /&gt;
    03-21-2019 18:39:28.928 INFO  CMBucketId - CMIndexId: New indexName=&lt;EM&gt;audit inserted, mapping to id=1&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  BatchSearch - index: _audit dbsize=5&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  UnifiedSearch - Initialization of search data structures took 7 ms&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  UnifiedSearch - Processed search targeting arguments&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  StatsProcessor - No group-by fields specified, incompatible for high cardinality improvements&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  LocalCollector - Final required fields list = _subsecond,index,prestats_reserved&lt;/EM&gt;&lt;EM&gt;,psrsvd_&lt;/EM&gt;&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  UserManager - Unwound user context: reda -&amp;gt; NULL&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  UserManager - Setting user context: reda&lt;BR /&gt;
    03-21-2019 18:39:28.930 INFO  UserManager - Done setting user context: NULL -&amp;gt; reda&lt;BR /&gt;
    03-21-2019 18:39:28.931 INFO  BatchSearch - Searching index:_audit with LISPY:'[ AND ]'&lt;BR /&gt;
    03-21-2019 18:39:28.932 ERROR LocalCollector - sid: bad allocation&lt;/P&gt;

&lt;P&gt;Field extraction algorithm may be different from Windows to Linux... &lt;/P&gt;

&lt;P&gt;Any pointer ?&lt;/P&gt;

&lt;P&gt;Please help&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:47:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-problem-with-fast-and-smart-mode/m-p/384820#M112388</guid>
      <dc:creator>ecoquelin</dc:creator>
      <dc:date>2020-09-29T23:47:55Z</dc:date>
    </item>
  </channel>
</rss>

