Splunk Search

tstats with timchart

mansel_scheffel
Explorer

Hi,

If I use tstats and timechart will the timechart slow down my search drastically(There is a ton of data so trying to be as efficient as possible)? I am trying to display changes over time in single value visual with a trend arrow up or down, without timechart the arrow does not show(currently using tstats by time with earliest and span etc).

Thanks

0 Karma
1 Solution

esix_splunk
Splunk Employee
Splunk Employee

Stats is a transforming command and is processed on the search head side. Once you have run your tstats command, piping it to stats should be efficient and quick. Typically the big slow down is streaming of the search events from the indexing tier to the SH for aggregation and transformation.
Since you are using tstats, I am assuming youre using this against a normal indexed fields (as opposed to an accelerated data model.) As long as you understand what you are aggregating with tstats, using it in this way is efficient (and much faster then the traditional index=xxxx search..)
Check your search log and you can see where the most time incurred is and could look at ways to speed it up. Typically its either in streaming from the indexing tier or its in parsing where regular expressions are not performant.

View solution in original post

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

Stats is a transforming command and is processed on the search head side. Once you have run your tstats command, piping it to stats should be efficient and quick. Typically the big slow down is streaming of the search events from the indexing tier to the SH for aggregation and transformation.
Since you are using tstats, I am assuming youre using this against a normal indexed fields (as opposed to an accelerated data model.) As long as you understand what you are aggregating with tstats, using it in this way is efficient (and much faster then the traditional index=xxxx search..)
Check your search log and you can see where the most time incurred is and could look at ways to speed it up. Typically its either in streaming from the indexing tier or its in parsing where regular expressions are not performant.

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...