Splunk Commands : Discussion on tstats command

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ส.ค. 2024
  • In this video I have discussed about tstats command in splunk.
    Use the tstats command to perform statistical queries on indexed fields in tsidx files. The indexed fields can be from normal index data, tscollect data, or accelerated data models.
    Diagram and code used in this tutorial can be downloaded from the below repo :
    github.com/sid...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 27

  • @shikhaupadhyay3843
    @shikhaupadhyay3843 3 ปีที่แล้ว +1

    Thank you sir! The way you teach, in these videos, every concept looks very simple...Keep sharing your knowledge!

  • @DickSvensson
    @DickSvensson 5 ปีที่แล้ว +1

    Great video with excellent structure and explanations. Thanks for sharing your knowleged about splunk.

    • @splunk_ml
      @splunk_ml  5 ปีที่แล้ว

      Thank you 👍

  • @SantoshKumar-bm2iz
    @SantoshKumar-bm2iz 2 ปีที่แล้ว

    You are a brilliant guy Sir....Good explanation

  • @takeshikovacs1081
    @takeshikovacs1081 4 ปีที่แล้ว

    Thanks for the tutorial! Really helpful. Brilliant channel! Looking forward to more of your videos.

  • @reenzz2007
    @reenzz2007 5 ปีที่แล้ว +1

    Thank you so much for the videos!!!

  • @simple-security
    @simple-security 5 ปีที่แล้ว

    If you're not using tstats and data models (with acceleration), you don't understand how to use Splunk at scale.
    Excellent video as usual sir.
    I'd also recommend people look at these Spunk .conf presentations for more inspiration on this topic. conf.splunk.com/watch/conf-online.html?search=tstats#/
    It's so important to know how to use this for reports and dashboards if you want them to work super fast.
    Splunk Enterprise Security wouldn't exist without these features.

    • @splunk_ml
      @splunk_ml  5 ปีที่แล้ว +1

      Thank you for sharing the splunk conf link... Its an excellent read.

  • @amarkondraju1379
    @amarkondraju1379 5 ปีที่แล้ว +2

    superb

  • @ambidextrous2010
    @ambidextrous2010 3 ปีที่แล้ว

    too good, cant thank you enough

  • @TheSharkdba
    @TheSharkdba 4 ปีที่แล้ว

    Very good tutorial. One question regarding acceleration: what is the recommended summary range? You chose 7 days in your example, but what are the advantages/disadvantages of choosing a different range?

    • @splunk_ml
      @splunk_ml  4 ปีที่แล้ว +1

      It purely depends on the date range you are going to use in your pivot report. For example, if you have a data model that accelerates the last month of data but you create a pivot using one of this data model's dataset that runs over the past year, the pivot will initially only get acceleration benefits for the portion of the search that runs over the past month.
      if you use bigger range it will take more space and building the summary will also take time.

  • @debashispanda6854
    @debashispanda6854 5 ปีที่แล้ว

    Could you please help, how to add the "|transaction keepvicted=true by sessionId" in DataModel ?

    • @splunk_ml
      @splunk_ml  5 ปีที่แล้ว

      Hi Debashis,
      Please refer the below link and see if this is helpful,.
      answers.splunk.com/answers/232663/how-to-create-a-data-model-from-a-subset-of-all-tr.html

  • @timlindgren478
    @timlindgren478 3 ปีที่แล้ว

    fyi - walklex is available in SplunkWeb.

  • @dilsheeralip1267
    @dilsheeralip1267 3 ปีที่แล้ว

    Nice video ..Where exactly the summary index data has been stored ?. Is it on indexers or SH ?.

    • @splunk_ml
      @splunk_ml  3 ปีที่แล้ว

      Summary index is just like other indexes, only difference is how data are stored over there, so indexers.

  • @kedrickevans8475
    @kedrickevans8475 4 ปีที่แล้ว

    How do you run a tstats query against the Threat Intelligence Datamodel?
    Example:
    | tstats summariesonly=true count
    from datamodel=“Threat_Intelligence.Threat_Activity”
    where nodename=“Threat_Activity.IP_Intelligence” by IP_Intelligence.threat_key

    • @splunk_ml
      @splunk_ml  4 ปีที่แล้ว

      It would be the same way you use tstats for other data models. Any specific error you are getting for the SPL you have given?

    • @kedrickevans8475
      @kedrickevans8475 4 ปีที่แล้ว

      @@splunk_ml
      The search SPL I listed above doesn't work since the file structure for the Threat Intelligence Datamodel only "Events" and "Searches" so when I attempt to run a stats command for IP_Intelligence to list city, postal code, country it doesn't work. No errors, just no return data even though the pivot shows data is present.

  • @faceofthesystem2841
    @faceofthesystem2841 2 ปีที่แล้ว

    Sir I can you please tell how to upload that .emmx file like what source type we should use?. It will be very helpful for me

    • @splunk_ml
      @splunk_ml  2 ปีที่แล้ว +1

      That is the mindmap I used for the video, you can ignore that file.

    • @faceofthesystem2841
      @faceofthesystem2841 2 ปีที่แล้ว

      @@splunk_ml Thank You Very Much Sir

  • @manubelfort9383
    @manubelfort9383 4 ปีที่แล้ว

    Could you make an video on rest api call please. Thanks in advance

    • @splunk_ml
      @splunk_ml  4 ปีที่แล้ว +1

      I created some... Please have a look at the advanced searching and reporting playlist.

  • @ravib6889
    @ravib6889 5 ปีที่แล้ว

    Bro how to optimize a splunk query?

    • @splunk_ml
      @splunk_ml  5 ปีที่แล้ว +1

      The first step is to see the job output.. There you will see the details about which command is taking more time...also you should see the converted query. I will try to create content for this.