Splunk Search

tstats with timchart

mansel_scheffel
Explorer

Hi,

If I use tstats and timechart will the timechart slow down my search drastically(There is a ton of data so trying to be as efficient as possible)? I am trying to display changes over time in single value visual with a trend arrow up or down, without timechart the arrow does not show(currently using tstats by time with earliest and span etc).

Thanks

0 Karma
1 Solution

esix_splunk
Splunk Employee
Splunk Employee

Stats is a transforming command and is processed on the search head side. Once you have run your tstats command, piping it to stats should be efficient and quick. Typically the big slow down is streaming of the search events from the indexing tier to the SH for aggregation and transformation.
Since you are using tstats, I am assuming youre using this against a normal indexed fields (as opposed to an accelerated data model.) As long as you understand what you are aggregating with tstats, using it in this way is efficient (and much faster then the traditional index=xxxx search..)
Check your search log and you can see where the most time incurred is and could look at ways to speed it up. Typically its either in streaming from the indexing tier or its in parsing where regular expressions are not performant.

View solution in original post

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

Stats is a transforming command and is processed on the search head side. Once you have run your tstats command, piping it to stats should be efficient and quick. Typically the big slow down is streaming of the search events from the indexing tier to the SH for aggregation and transformation.
Since you are using tstats, I am assuming youre using this against a normal indexed fields (as opposed to an accelerated data model.) As long as you understand what you are aggregating with tstats, using it in this way is efficient (and much faster then the traditional index=xxxx search..)
Check your search log and you can see where the most time incurred is and could look at ways to speed it up. Typically its either in streaming from the indexing tier or its in parsing where regular expressions are not performant.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...