Splunk Commands : Discussion on tstats command

Поделиться
HTML-код
  • Опубликовано: 29 ноя 2024

Комментарии • 27

  • @shikhaupadhyay3843
    @shikhaupadhyay3843 3 года назад +1

    Thank you sir! The way you teach, in these videos, every concept looks very simple...Keep sharing your knowledge!

  • @SantoshKumar-bm2iz
    @SantoshKumar-bm2iz 3 года назад

    You are a brilliant guy Sir....Good explanation

  • @takeshikovacs1081
    @takeshikovacs1081 5 лет назад

    Thanks for the tutorial! Really helpful. Brilliant channel! Looking forward to more of your videos.

  • @simple-security
    @simple-security 5 лет назад

    If you're not using tstats and data models (with acceleration), you don't understand how to use Splunk at scale.
    Excellent video as usual sir.
    I'd also recommend people look at these Spunk .conf presentations for more inspiration on this topic. conf.splunk.com/watch/conf-online.html?search=tstats#/
    It's so important to know how to use this for reports and dashboards if you want them to work super fast.
    Splunk Enterprise Security wouldn't exist without these features.

    • @splunk_ml
      @splunk_ml  5 лет назад +1

      Thank you for sharing the splunk conf link... Its an excellent read.

  • @amarkondraju1379
    @amarkondraju1379 5 лет назад +2

    superb

  • @TheSharkdba
    @TheSharkdba 4 года назад

    Very good tutorial. One question regarding acceleration: what is the recommended summary range? You chose 7 days in your example, but what are the advantages/disadvantages of choosing a different range?

    • @splunk_ml
      @splunk_ml  4 года назад +1

      It purely depends on the date range you are going to use in your pivot report. For example, if you have a data model that accelerates the last month of data but you create a pivot using one of this data model's dataset that runs over the past year, the pivot will initially only get acceleration benefits for the portion of the search that runs over the past month.
      if you use bigger range it will take more space and building the summary will also take time.

  • @reenzz2007
    @reenzz2007 5 лет назад +1

    Thank you so much for the videos!!!

  • @dilsheeralip1267
    @dilsheeralip1267 4 года назад

    Nice video ..Where exactly the summary index data has been stored ?. Is it on indexers or SH ?.

    • @splunk_ml
      @splunk_ml  4 года назад

      Summary index is just like other indexes, only difference is how data are stored over there, so indexers.

  • @ambidextrous2010
    @ambidextrous2010 3 года назад

    too good, cant thank you enough

  • @timlindgren478
    @timlindgren478 3 года назад

    fyi - walklex is available in SplunkWeb.

  • @debashispanda6854
    @debashispanda6854 5 лет назад

    Could you please help, how to add the "|transaction keepvicted=true by sessionId" in DataModel ?

    • @splunk_ml
      @splunk_ml  5 лет назад

      Hi Debashis,
      Please refer the below link and see if this is helpful,.
      answers.splunk.com/answers/232663/how-to-create-a-data-model-from-a-subset-of-all-tr.html

  • @faceofthesystem2841
    @faceofthesystem2841 2 года назад

    Sir I can you please tell how to upload that .emmx file like what source type we should use?. It will be very helpful for me

    • @splunk_ml
      @splunk_ml  2 года назад +1

      That is the mindmap I used for the video, you can ignore that file.

    • @faceofthesystem2841
      @faceofthesystem2841 2 года назад

      @@splunk_ml Thank You Very Much Sir

  • @ravib6889
    @ravib6889 5 лет назад

    Bro how to optimize a splunk query?

    • @splunk_ml
      @splunk_ml  5 лет назад +1

      The first step is to see the job output.. There you will see the details about which command is taking more time...also you should see the converted query. I will try to create content for this.

  • @manubelfort9383
    @manubelfort9383 4 года назад

    Could you make an video on rest api call please. Thanks in advance

    • @splunk_ml
      @splunk_ml  4 года назад +1

      I created some... Please have a look at the advanced searching and reporting playlist.

  • @kedrickevans8475
    @kedrickevans8475 4 года назад

    How do you run a tstats query against the Threat Intelligence Datamodel?
    Example:
    | tstats summariesonly=true count
    from datamodel=“Threat_Intelligence.Threat_Activity”
    where nodename=“Threat_Activity.IP_Intelligence” by IP_Intelligence.threat_key

    • @splunk_ml
      @splunk_ml  4 года назад

      It would be the same way you use tstats for other data models. Any specific error you are getting for the SPL you have given?

    • @kedrickevans8475
      @kedrickevans8475 4 года назад

      @@splunk_ml
      The search SPL I listed above doesn't work since the file structure for the Threat Intelligence Datamodel only "Events" and "Searches" so when I attempt to run a stats command for IP_Intelligence to list city, postal code, country it doesn't work. No errors, just no return data even though the pivot shows data is present.