Splunk Search

How do I display the largest value of multiple fields in an event?

sajbutler
Path Finder

I have a search which results in an event which has multiple instances of the field eltime.

alt text

Does anyone know how I can only display the largest value of the field eltime

Tags (1)
0 Karma

lpolo
Motivator

did you tried:

|stats max(eltime) as largest_value_of_eltime.

lpolo
Motivator

If eltime is the result of a transaction command your transaction command should group all the values of eltime in a multi-value list. Then, you should be able to get the maximum. like for example:

|transaction eltime delim="," mvlist=eltime|eval maximum_eltime=max(eltime)|table maximum_eltime

0 Karma

sajbutler
Path Finder

Doesn't quite work the way I want it to. I want to determine the maximum value of eltime for each event (there are multiple instances of eltime for each event - This is because each event is an output of the transaction command)

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...