Splunk Search

What is the fastest way to run a query to get an event count on a timechart per host?

Splunk77
Explorer

What is the fastest way to run a query to get an event count on a timechart per host? This is for windows events and I want to get a list of how many events each device is logging per month so that I can identify the increase/decrease.

They are all ingested in one index. A query like this will take a while to run if run for about a year. Is there a faster way to get this data?

index=<index_name>
| timechart count by Computer span=1mon

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The tstats command will be faster, but processing a year of data for all hosts will still take a long time.

| tstats prestats=true count where index=foo by _time,host span=1mon
| timechart span=1mon count by host

 

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...