<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Streamlining with tstats in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676265#M231309</link>
    <description>&lt;P&gt;Ah Thank you Richfez, i was unaware the tstats only worked with time related fields. I will have a read through that document you linked and work from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again really appreciate it&lt;/P&gt;</description>
    <pubDate>Thu, 01 Feb 2024 15:25:35 GMT</pubDate>
    <dc:creator>supersnedz</dc:creator>
    <dc:date>2024-02-01T15:25:35Z</dc:date>
    <item>
      <title>Streamlining with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676252#M231304</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;im looking to create a dashboard to capture various info on or proxy data. I have a few simple queries&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=siem-proxy | top limit=5 cs_method&lt;/LI-CODE&gt;
&lt;P&gt;and my other query&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=siem-proxy | top limit=8 dest_port&lt;/LI-CODE&gt;
&lt;P&gt;this gets the requests methods such as POST, GET etc. I want to add this to a dashboard but looking to streamline the query first, i tried using tstats but was getting nothing back some I think im getting the syntax wrong. Without streamlining the queries are taking a very long time to run as i have millions of events. Is there a way to put this into a tstats query that I can use as&amp;nbsp; visualization?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 15:08:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676252#M231304</guid>
      <dc:creator>supersnedz</dc:creator>
      <dc:date>2024-02-01T15:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Streamlining with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676256#M231305</link>
      <description>&lt;P&gt;What &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; commands have you tried so far?&lt;/P&gt;&lt;P&gt;A key thing to remember about &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; is that it can only search for index-time fields or fields in an accelerated datamodel.&amp;nbsp; Use the &lt;FONT face="courier new,courier"&gt;walklex&lt;/FONT&gt; command to see if the fields you want to use are indexed.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 15:11:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676256#M231305</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-02-01T15:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Streamlining with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676259#M231308</link>
      <description>&lt;P&gt;tstats only works with index-time fields, and those fields are all likely to be search-time.&lt;/P&gt;&lt;P&gt;Alternatives in this case to try to improve performance:&lt;/P&gt;&lt;P&gt;1) Report acceleration, which should let you create a saved report that keeps most of the details of the search up-to-date, then you refer to that in your dashboard and it should drop the time *way* down.&lt;/P&gt;&lt;P&gt;2) Or build a data model (if one doesn't exist in the CIM add on already) for this data, and accelerate the data model.&amp;nbsp; Similar to above in overall speed, but quite a bit different under the hood and more flexible.&lt;/P&gt;&lt;P&gt;Both of these (and some other options) are in the docs, well explained, here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.3/Knowledge/Aboutsummaryindexing" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.3/Knowledge/Aboutsummaryindexing&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I hope that gets you started!&lt;/P&gt;&lt;P&gt;Happy Splunking!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 15:16:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676259#M231308</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2024-02-01T15:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Streamlining with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676265#M231309</link>
      <description>&lt;P&gt;Ah Thank you Richfez, i was unaware the tstats only worked with time related fields. I will have a read through that document you linked and work from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again really appreciate it&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 15:25:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676265#M231309</guid>
      <dc:creator>supersnedz</dc:creator>
      <dc:date>2024-02-01T15:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Streamlining with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676279#M231312</link>
      <description>&lt;P&gt;Well, tstats works with more than just time fields.&amp;nbsp; The limitation is that it only works with fields that are created *at* the time the events are indexed.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.3/Indexer/Indextimeversussearchtime" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.3/Indexer/Indextimeversussearchtime&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I honestly think some of that information about performance or whatever is outdated, but most of that's all still fine documentation.&lt;/P&gt;&lt;P&gt;Index time fields are those created when the data's indexed.&amp;nbsp; By default it's just the built-in fields, like _time, sourcetype, and so on.&lt;/P&gt;&lt;P&gt;In some cases it's all the fields, for instance with INDEXED_EXTRACTIONS=&amp;lt;json/csv/whatever&amp;gt;.&lt;/P&gt;&lt;P&gt;But otherwise Splunk generally relies on search time fields - fields that are built "on the fly" as you run your search.&amp;nbsp; It's more flexible and doesn't go 'out of date' as events change or your needed fields change around.&lt;/P&gt;&lt;P&gt;The docs above should have links off them to explain more, but that's the gist of it.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 15:57:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Streamlining-with-tstats/m-p/676279#M231312</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2024-02-01T15:57:47Z</dc:date>
    </item>
  </channel>
</rss>

