Splunk Search

What is the fastest way to run a query to get an event count on a timechart per host?

Splunk77
Explorer

What is the fastest way to run a query to get an event count on a timechart per host? This is for windows events and I want to get a list of how many events each device is logging per month so that I can identify the increase/decrease.

They are all ingested in one index. A query like this will take a while to run if run for about a year. Is there a faster way to get this data?

index=<index_name>
| timechart count by Computer span=1mon

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The tstats command will be faster, but processing a year of data for all hosts will still take a long time.

| tstats prestats=true count where index=foo by _time,host span=1mon
| timechart span=1mon count by host

 

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...