Splunk Search

Speeding up Search in Timechart and D3

kteki1
New Member

Hi,

I am using D3 Chart to display the output from the following query:

sourcetype=WinEventLog:Security  | timechart span=1h count as total | appendcols [search 
sourcetype=WinEventLog:Security | timechart span=1h count by eventtype   ] | table _time * total

And I have used report acceleration to get faster results for this query. Currently it takes over five minutes to process and display the query.

Any ideas to speed up the query?

Tags (2)
0 Karma
1 Solution

lguinn2
Legend

Avoid appendcols or join.

sourcetype=WinEventLog:Security  
| timechart span=1h count by eventtype 
| addtotals

Should be at least twice as fast.

View solution in original post

lguinn2
Legend

Avoid appendcols or join.

sourcetype=WinEventLog:Security  
| timechart span=1h count by eventtype 
| addtotals

Should be at least twice as fast.

Get Updates on the Splunk Community!

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Automatic Discovery Part 2: Setup and Best Practices

In Part 1 of this series, we covered what Automatic Discovery is and why it’s critical for observability at ...