Splunk Search

Highest averages in each category

pveeramani
Explorer

(index=hosts) startminutesago="10" | stats avg(exectime) by host, pname

per host you can have many pnames

what I want is the top 5 with max averages in each host and thier pname

If I do a sort and head, its just going to give me the highest ones across all hosts and that is not what I want.

Tags (1)

Stephen_Sorkin
Splunk Employee
Splunk Employee

You should use the dedup command to get the top 5 per host:

(index=hosts) startminutesago="10" | stats avg(exectime) by host, pname | sort - host avg(exectime) | dedup 5 host

pveeramani
Explorer

Awesome, thanks.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...