<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracted field in fast mode in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754846#M242887</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231845"&gt;@jariw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you're comparing&amp;nbsp;pears with apples!&lt;/P&gt;&lt;P&gt;to compare two searches, you have to work:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;on the same machine and in the same time,&lt;/LI&gt;&lt;LI&gt;not using earliest=now, but something in the past (e.g. from &lt;A href="mailto:-70m@m" target="_blank"&gt;-70m@m&lt;/A&gt;&amp;nbsp;to &lt;A href="mailto:-10m@m" target="_blank"&gt;-10m@m&lt;/A&gt;), to be sure to search on the same events,&lt;/LI&gt;&lt;LI&gt;run both the searches in the same app, because there could be different eventtypes, tags and field extractions that give different times,&lt;/LI&gt;&lt;LI&gt;use the same mode: Fast, Smart or Verbose, isn't relevant, but use the same.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Anyway, the presence of ES on a SH gives a greater load on the server, so this server must have more resources (e.g. to run Splunk you need at least 12 CPUs, to run ES you need at least 16 CPUs or more!), so for this reason you cannot compare searches.&lt;/P&gt;&lt;P&gt;But, why do you need to do this comparison?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 28 Oct 2025 12:51:40 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2025-10-28T12:51:40Z</dc:date>
    <item>
      <title>Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754841#M242884</link>
      <description>&lt;P&gt;Hello,&amp;nbsp; &amp;nbsp;i try to understand the "fast mode" compared to the "smart" and "verbose mode" in relation to field extractions.&lt;/P&gt;&lt;P&gt;Backgound:&amp;nbsp; &amp;nbsp;I am investigating the slownes of Splunk searches on the "Enterprise&amp;nbsp; Security SHC" compared to non ES SHC. I tried below search:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=wineventlog earliest=1761217200 latest=1761220800&lt;/P&gt;&lt;P&gt;on both SHC.&amp;nbsp; It gives a difference. ES takes 30 sec's , non ES takes 17 sec's.&lt;/P&gt;&lt;P&gt;I noticed that the "interesting fields" are different. Besides the default fields on the ES SHC there is the "Messages" field.&amp;nbsp; That's no default field. On the non ES SHC there are only the default fields visible.&lt;/P&gt;&lt;P&gt;I checked all the props, transforms, viewstates... whatever to find the cause off this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i do the search on the non ES SHC with extra "Messages=*" .&amp;nbsp; Then it gives the same search time as on the ES SHS.&amp;nbsp; So it looks like a extra extraction on the ES SHC, one which we don't know anything about. On which happens "under water".&lt;/P&gt;&lt;P&gt;Maybe it is the cause off the slowness, maybe not. But i want to now why this happens before looking anything further.&lt;/P&gt;&lt;P&gt;Can anybody explain the use off "fast mode" and when (c.q. why) this field extraction happens? WHy is this "Messages" in the interesting fields? What can cause this to happen?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Greetings&lt;/P&gt;&lt;P&gt;Jari&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 11:33:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754841#M242884</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-28T11:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754844#M242885</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231845"&gt;@jariw&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is Messages an index-time field which is defined in fields.conf on the ES SH? This might explain why it appears in fast mode on the ES SH but no the other.&lt;/P&gt;&lt;P&gt;"Fast mode" in Splunk is designed to prioritise the speed of search results by minimising unnecessary processing and field extraction. Specifically, in fast mode Field Discovery is somewhat limited and you will probably find no search-time extractions appear, however indexed fields will.&lt;/P&gt;&lt;P&gt;The ES SH may have a bunch of additional automatic lookups which may be adding time to the processing.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 11:59:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754844#M242885</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-10-28T11:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754845#M242886</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanx for the quick response.&lt;/P&gt;&lt;P&gt;This fields.conf is new for me, but&lt;/P&gt;&lt;P&gt;/opt/splunk/bin/splunk btool fields list&lt;/P&gt;&lt;P&gt;gave no Messages field in the list with fields.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So "&lt;SPAN&gt;&amp;nbsp;Field Discovery is somewhat limited" , but to which degree ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;greets&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jari&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 12:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754845#M242886</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-28T12:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754846#M242887</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231845"&gt;@jariw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you're comparing&amp;nbsp;pears with apples!&lt;/P&gt;&lt;P&gt;to compare two searches, you have to work:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;on the same machine and in the same time,&lt;/LI&gt;&lt;LI&gt;not using earliest=now, but something in the past (e.g. from &lt;A href="mailto:-70m@m" target="_blank"&gt;-70m@m&lt;/A&gt;&amp;nbsp;to &lt;A href="mailto:-10m@m" target="_blank"&gt;-10m@m&lt;/A&gt;), to be sure to search on the same events,&lt;/LI&gt;&lt;LI&gt;run both the searches in the same app, because there could be different eventtypes, tags and field extractions that give different times,&lt;/LI&gt;&lt;LI&gt;use the same mode: Fast, Smart or Verbose, isn't relevant, but use the same.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Anyway, the presence of ES on a SH gives a greater load on the server, so this server must have more resources (e.g. to run Splunk you need at least 12 CPUs, to run ES you need at least 16 CPUs or more!), so for this reason you cannot compare searches.&lt;/P&gt;&lt;P&gt;But, why do you need to do this comparison?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 12:51:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754846#M242887</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-10-28T12:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754849#M242888</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can understand the same machine. but about time the search itself has the time in it (&amp;nbsp;earliest=1761217200 latest=1761220800 ) so that must be no problem.&lt;/P&gt;&lt;P&gt;Both searches are run from Search.. so i think same app&lt;/P&gt;&lt;P&gt;And indeed the ES has much more extra overhead, and maybe there is something for the "Messages' field.&lt;/P&gt;&lt;P&gt;But the question is in fact what can cause the "Messages" field to apear in the interesting fields. after that i will look further for the slow searches.&lt;/P&gt;&lt;P&gt;greets&lt;/P&gt;&lt;P&gt;Jari&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 13:21:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754849#M242888</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-28T13:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754860#M242889</link>
      <description>&lt;P&gt;OK. If a search is running in Fast mode, Splunk only extracts the fields explicitly named in the search (and reads the default metadata indexed fields). If you run in Verbose mode, Splunk extracts everything it can. Additionally it "back-maps" eventtypes and tags to events. That's where the difference in execution time comes from.&lt;/P&gt;&lt;P&gt;And since Splunk doesn't extract the fields when running in Fast mode it doesn't show you those fields in "Interesting fields".&lt;/P&gt;&lt;P&gt;EDIT: Splunk can be... "tamed" a bit around field extraction even in Smart/Verbose mode by using the fields command. This isn't that important when running the searches manually but since reports run in Smart mode, limiting extracted fields can have performance impact.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 14:50:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754860#M242889</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-10-28T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754862#M242890</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "strange" thing is.. both searches are in fast mode... even the one which gives the Message field.&lt;/P&gt;&lt;P&gt;I can't find where this field is extracted during the search, and it isn't a indexed field. (if it was, the fast mode should have showed it on both SHC).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;greetz&lt;/P&gt;&lt;P&gt;Jari&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 14:55:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754862#M242890</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-28T14:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754865#M242891</link>
      <description>&lt;P&gt;Is it the same search?&lt;/P&gt;&lt;P&gt;Also - I'm not sure what happens if you "pin" a field into the "interesting fields" section manually. I don't use this functionality myself.&lt;/P&gt;&lt;P&gt;Anyway, you might want to compare the job details for both searches and see whether the field is explicitly requested somehow. (and go down into the job log if you're brave enough &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 17:04:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754865#M242891</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-10-28T17:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754911#M242892</link>
      <description>&lt;P&gt;Yep... same search.&lt;/P&gt;&lt;P&gt;I am going the search properties way now, Dirst thing i noticed in the results:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ES SHC: eventFieldCount 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;non ES:&amp;nbsp;eventFieldCount 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;greets&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jari&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 07:33:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754911#M242892</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-29T07:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754912#M242893</link>
      <description>&lt;P&gt;I've found something in de search.log from the indexer peer itself.&lt;/P&gt;&lt;P&gt;In the non ES search i found:&lt;/P&gt;&lt;P&gt;INFO SearchOperator:kv [2700279 StreamSearch] - Trying to disable extractor name="wel-message"&lt;BR /&gt;INFO SearchOperator:kv [2700279 StreamSearch] - Disabling extractor name="wel-message" - it does not extract any of the required fields&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And on the ES search i found only:&lt;/P&gt;&lt;P&gt;INFO SearchOperator:kv [2495326 StreamSearch] - Trying to disable extractor name="wel-message"&lt;/P&gt;&lt;P&gt;Not disabling this extraction (and multiple other extractions. So it seems that in fast mode not all extractions are disabled on the ES SHC.&lt;/P&gt;&lt;P&gt;Question is why..&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 08:37:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754912#M242893</guid>
      <dc:creator>jariw</dc:creator>
      <dc:date>2025-10-29T08:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754956#M242894</link>
      <description>&lt;P&gt;On ES there will also be a ton of automatic lookups. If you look at the search.log you will see lines like&lt;/P&gt;&lt;PRE&gt;CsvDataProvider [2092202 searchOrchestrator] - Reading schema for lookup table=&lt;/PRE&gt;&lt;P&gt;how many of each do you have in each environment. That can change what fields you will see and it certainly can affect performance significantly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the effect of this behaviour if you upload a private app that has an &lt;STRONG&gt;import = search&lt;/STRONG&gt; statement in default.meta and then run your search in that uploaded app's context. The undocumented import statement appears to override which apps are evaluated to give the app its runtime context, so by removing all other apps, you will not get any of the field extractions provided by those TAs or any of the lookups.&lt;/P&gt;&lt;P&gt;I have an existing site where I have an app that has an import statement and the searches run several times faster in that app's context compared to any other.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 22:21:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754956#M242894</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2025-10-29T22:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Extracted field in fast mode</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754958#M242895</link>
      <description>&lt;P&gt;I would expect it to be the other way around. Splunk can optimize out some extractions so that not all are run if not all are needed. So if the fields extracted by a particular extraction are known and were not requested Splunk might not run the extraction during search at all.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 04:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracted-field-in-fast-mode/m-p/754958#M242895</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-10-30T04:52:13Z</dc:date>
    </item>
  </channel>
</rss>

