Splunk Enterprise

Why am getting Different statistical count in fast and verbose mode? Problem is that dashboard is saved in fast mode and it doesnt make sense if i dont get accurate figures in dashboard

angadbagga
Explorer

My query is something like this,

index=anything sourcetype=something OWNER_GROUP="Hello_world" OR OWNER_GROUP="Hello_mars" CASE_TYPE=1|eval Start=(strptime(SUBMIT_DATE,"%F%T")+3600)|where Start>relative_time(now(),"--7d")|dedup CASE_ID|eval Priority="P"+tostring(PRIORITY+1)|search STATUS=1 OR STATUS=2 OR STATUS=3|stats count as Total"

In verbose mode am getting 1120 count where as in fast mode am getting 883. In saved dashboard am getting 883 as count.

Tags (3)
0 Karma

woodcock
Esteemed Legend

This should not be surprising at all. You need to be aware of what fast mode is; there is no free lunch here. One of the main differences is that auto-kv expansion of KVP-encodings in your events are not done. My suspicion is that some of your events that are not covered by an explicit field extraction still do have things like ... STATUS=1 ... inside the raw text. So if this does not get extracted directly, then in fast mode, the STATUS field will not exist, however in verbose mode (unless this is disallowed with KV_MODE = none for this sourcetype), the KV_MODE=auto will happen and create the STATUS field. There is no mystery here. That is exactly how fast mode is supposed to work. You have to understand both your data and your field extractions before you can "trust" fast mode.

0 Karma

DalJeanis
Legend

You are going to need to determine examples of events that are missing, and determine why they are failing in fast mode. Run this each way and output to a csv file, then compare the two csv files, and examine the records that come out under verbose mode but not over fast mode.

index=anything sourcetype=something OWNER_GROUP="Hello_world" OR OWNER_GROUP="Hello_mars" CASE_TYPE=1|eval Start=(strptime(SUBMIT_DATE,"%F%T")+3600)|where Start>relative_time(now(),"--7d")
| dedup CASE_ID|eval Priority="P"+tostring(PRIORITY+1)|search STATUS=1 OR STATUS=2 OR STATUS=3
| table _time _raw OWNER_GROUP CASE_TYPE Start CASE_ID Priority PRIORITY STATUS

I suspect that some field is either overrriding START or STATUS, or possibly CASE_ID, and resulting in the loss of records.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...