Splunk Search

Search for top results

JelianeL
Explorer

| eval totalCount = cCounter + lCounter

| eventstats max(totalCount) as maxTotal

| table id, time, message, cCounter, lCounter, totalCount

| sort -totalCount

Hi 😃 my current search command is as above.

How do I actually display only top 5 totalCount? I trying adding "top 5 totalCount", but does not work.

Tags (1)
0 Karma
1 Solution

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

View solution in original post

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...