Splunk Search

Search for top results

JelianeL
Explorer

| eval totalCount = cCounter + lCounter

| eventstats max(totalCount) as maxTotal

| table id, time, message, cCounter, lCounter, totalCount

| sort -totalCount

Hi 😃 my current search command is as above.

How do I actually display only top 5 totalCount? I trying adding "top 5 totalCount", but does not work.

Tags (1)
0 Karma
1 Solution

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

View solution in original post

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...