Splunk Search

Speeding up Search in Timechart and D3

kteki1
New Member

Hi,

I am using D3 Chart to display the output from the following query:

sourcetype=WinEventLog:Security  | timechart span=1h count as total | appendcols [search 
sourcetype=WinEventLog:Security | timechart span=1h count by eventtype   ] | table _time * total

And I have used report acceleration to get faster results for this query. Currently it takes over five minutes to process and display the query.

Any ideas to speed up the query?

Tags (2)
0 Karma
1 Solution

lguinn2
Legend

Avoid appendcols or join.

sourcetype=WinEventLog:Security  
| timechart span=1h count by eventtype 
| addtotals

Should be at least twice as fast.

View solution in original post

lguinn2
Legend

Avoid appendcols or join.

sourcetype=WinEventLog:Security  
| timechart span=1h count by eventtype 
| addtotals

Should be at least twice as fast.

Get Updates on the Splunk Community!

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...

New This Month in Splunk Observability Cloud - Synthetic Monitoring updates, UI ...

This month, we’re delivering several platform, infrastructure, application and digital experience monitoring ...