Splunk Enterprise

Why my search query returns only top 10k records?

akarivaratharaj
Communicator

I have a very basic search query to display ID and it's respective name. There are 1.3 lakhs of data events under the respective sourcetype and all the events have ID and name field in it.

When I run the search query to display the ID and name, only top 10,000 records are displaying.

I have tried to display the results using stats command, table command, chart command and  fields + table command. In all of these methods only top 10k records are showing in the statistics section.

But I need all the 1.3 lakh IDs and Names to be displayed so that I can output those data to a lookup file.

Here is my search query

index=main source=splunk_id_name.log sourcetype=id_metric host=xxx
|stats values(name) by id
|sort id
|rename id AS ID name AS Name

 

Is this the limit of records which can be displayed in Splunk? Or am I missing with any other command?


I need this very urgently. Could anyone please help me on this to get resolved as soon as possible.

Labels (1)
Tags (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

sort has a default limit of 10000 try

| sort 0 id

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

sort has a default limit of 10000 try

| sort 0 id

akarivaratharaj
Communicator

Thankyou @ITWhisperer  it's worked for me.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud's AI Assistant in Action Series: Auditing Compliance and ...

This is the third post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

What You Read The Most: Splunk Lantern’s Most Popular Articles!

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...