Splunk Search

Filter search result to only include events that has top N largest values

Findekano
Engager

Hi -

I am building a query as below:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | where requestCountByService > 5000 | timechart count by remoteServiceName

The intent was only services that has more than 5000 requests in the given search time window. There are 2 problems that I want to fix:

  1. The hard coded number 5000 is not flexible. I would like to use something like top 5 to show the top 5 services that made the most requests.
  2. The query above will exclude the request made by other services that doesn't meet the where clause. I want to show them as 'OTHER` group.

How should I update the search query? Thanks in advance!

Tags (1)
0 Karma
1 Solution

Findekano
Engager

Figured it out. Just use timechart directly:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | timechart count by remoteServiceName limit=3

View solution in original post

0 Karma

Findekano
Engager

Figured it out. Just use timechart directly:

sourcetype=my-data | eventstats count(request-id) as requestCountByService by remoteServiceName | timechart count by remoteServiceName limit=3

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...