Hello, i try to understand the "fast mode" compared to the "smart" and "verbose mode" in relation to field extractions. Backgound: I am investigating the slownes of Splunk searches on the "Enterprise Security SHC" compared to non ES SHC. I tried below search: index=wineventlog earliest=1761217200 latest=1761220800 on both SHC. It gives a difference. ES takes 30 sec's , non ES takes 17 sec's. I noticed that the "interesting fields" are different. Besides the default fields on the ES SHC there is the "Messages" field. That's no default field. On the non ES SHC there are only the default fields visible. I checked all the props, transforms, viewstates... whatever to find the cause off this. If i do the search on the non ES SHC with extra "Messages=*" . Then it gives the same search time as on the ES SHS. So it looks like a extra extraction on the ES SHC, one which we don't know anything about. On which happens "under water". Maybe it is the cause off the slowness, maybe not. But i want to now why this happens before looking anything further. Can anybody explain the use off "fast mode" and when (c.q. why) this field extraction happens? WHy is this "Messages" in the interesting fields? What can cause this to happen? Thanks in advance. Greetings Jari
... View more