Splunk Search

What is the fastest way to run a query to get an event count on a timechart per host?

Splunk77
Explorer

What is the fastest way to run a query to get an event count on a timechart per host? This is for windows events and I want to get a list of how many events each device is logging per month so that I can identify the increase/decrease.

They are all ingested in one index. A query like this will take a while to run if run for about a year. Is there a faster way to get this data?

index=<index_name>
| timechart count by Computer span=1mon

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The tstats command will be faster, but processing a year of data for all hosts will still take a long time.

| tstats prestats=true count where index=foo by _time,host span=1mon
| timechart span=1mon count by host

 

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...

Splunk New Course Releases for a Changing World

Every day, the world feels like it’s moving faster with new technological breakthroughs, AI innovation, and ...