<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query Performace in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549695#M155994</link>
    <description>&lt;P&gt;Take a look at the field extractor in the UI - you can get there from a raw event, via the Event Actions drop down. Splunk is great at unstructured data and it's really good to take a look at how you do field extractions, as it will help you a lot.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bowesmana_0-1619648505124.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/13960i7AFB4D33B199E7A9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bowesmana_0-1619648505124.png" alt="bowesmana_0-1619648505124.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You can extract fields based on regular expressions or delimiters, if you don't know much about regex, then &lt;A href="https://regex101.com" target="_blank"&gt;https://regex101.com&lt;/A&gt;&amp;nbsp;is a good place to look to play with regex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Apr 2021 22:23:19 GMT</pubDate>
    <dc:creator>bowesmana</dc:creator>
    <dc:date>2021-04-28T22:23:19Z</dc:date>
    <item>
      <title>Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549503#M155917</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am building a query to be able to display a line graph of status (offline, online) over a period of 30days.&amp;nbsp; Query currently is so slow it usually doesn't finish.&amp;nbsp; looking for assistance to see if I can do something different to speed it up.&amp;nbsp; thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current query:&lt;/P&gt;&lt;P&gt;index=mydata sourcetype="mySourceType" (_raw=*offline* OR _raw=*online*)&amp;nbsp;&lt;BR /&gt;| eval status=if(like(_raw, "%offline%"),"Offline","Online")&lt;BR /&gt;| timechart span=1d count by status&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 18:02:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549503#M155917</guid>
      <dc:creator>dglass0215</dc:creator>
      <dc:date>2021-04-27T18:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549512#M155922</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/117218"&gt;@dglass0215&lt;/a&gt;,&lt;BR /&gt;You don't need to use wildcard (*) in the base search. Try the below query without the &lt;STRONG&gt;timechart&lt;/STRONG&gt;&amp;nbsp;first and check the performance. Then add timechart and check the performance.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=mydata sourcetype="mySourceType" offline OR online 
| rex "(?&amp;lt;status&amp;gt;offline)" 
| eval status=if(status="offline","Offline","Online")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 18:38:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549512#M155922</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-04-27T18:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549560#M155942</link>
      <description>&lt;P&gt;Create a field extraction where you extract the current status from raw for that sourcetype, so when you search for it, you can search for all records with status, e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=mydata sourcetype="mySourceType" status=*
| timechart span=1d count by status&lt;/LI-CODE&gt;&lt;P&gt;otherwise the leading wildcard combined with _raw= is going to have to search all the data for that sourcetype for your time period. Any row that does not have an extracted status field will not be found.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 04:47:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549560#M155942</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-04-28T04:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549614#M155962</link>
      <description>&lt;P&gt;Not sure how to do that when the data is unstructured.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 13:22:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549614#M155962</guid>
      <dc:creator>dglass0215</dc:creator>
      <dc:date>2021-04-28T13:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549615#M155963</link>
      <description>&lt;P&gt;Thank you.&amp;nbsp; This definitely helped to speed it up.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 13:23:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549615#M155963</guid>
      <dc:creator>dglass0215</dc:creator>
      <dc:date>2021-04-28T13:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Query Performace</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549695#M155994</link>
      <description>&lt;P&gt;Take a look at the field extractor in the UI - you can get there from a raw event, via the Event Actions drop down. Splunk is great at unstructured data and it's really good to take a look at how you do field extractions, as it will help you a lot.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bowesmana_0-1619648505124.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/13960i7AFB4D33B199E7A9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bowesmana_0-1619648505124.png" alt="bowesmana_0-1619648505124.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You can extract fields based on regular expressions or delimiters, if you don't know much about regex, then &lt;A href="https://regex101.com" target="_blank"&gt;https://regex101.com&lt;/A&gt;&amp;nbsp;is a good place to look to play with regex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 22:23:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-Performace/m-p/549695#M155994</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-04-28T22:23:19Z</dc:date>
    </item>
  </channel>
</rss>

