Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Splunk Best Practices

You're reading from  Splunk Best Practices

Product type Book
Published in Sep 2016
Publisher Packt
ISBN-13 9781785281396
Pages 244 pages
Edition 1st Edition
Languages

Search modes


For the more advanced Splunker, search modes are quite important, and can save you plenty of time when speaking with a user that isn't very Splunk savvy. I will simply recap these, and mention that by default, Splunk runs in Smart Mode.

If you would like to change the mode in a search, just use the mode selector drop-down menu, below the time range picker, after you run a query.

Fast Mode

Fast Mode in Splunk will search all of the data you ask for, and then only return the essential parts of that data in its result set, as well as the fields you mentioned in your query. This will omit any unused fields, and no event data. So basically you will have sourcetype, source, host, and whatever fields you ask for from your data in your result set and that is all.

Note

Note that Field Discovery is off on Fast Mode, which is why it will only return the fields you ask for.

Here is an example of running a fast search:

index=network sourcetype=fw | stats count by service | sort - count | head...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}