Splunk Search

Filter search result to only include events that has top N largest values

Findekano
Engager

Hi -

I am building a query as below:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | where requestCountByService > 5000 | timechart count by remoteServiceName

The intent was only services that has more than 5000 requests in the given search time window. There are 2 problems that I want to fix:

  1. The hard coded number 5000 is not flexible. I would like to use something like top 5 to show the top 5 services that made the most requests.
  2. The query above will exclude the request made by other services that doesn't meet the where clause. I want to show them as 'OTHER` group.

How should I update the search query? Thanks in advance!

Tags (1)
0 Karma
1 Solution

Findekano
Engager

Figured it out. Just use timechart directly:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | timechart count by remoteServiceName limit=3

View solution in original post

0 Karma

Findekano
Engager

Figured it out. Just use timechart directly:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | timechart count by remoteServiceName limit=3

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...