Splunk Search

How do I display the largest value of multiple fields in an event?

sajbutler
Path Finder

I have a search which results in an event which has multiple instances of the field eltime.

alt text

Does anyone know how I can only display the largest value of the field eltime

Tags (1)
0 Karma

lpolo
Motivator

did you tried:

|stats max(eltime) as largest_value_of_eltime.

lpolo
Motivator

If eltime is the result of a transaction command your transaction command should group all the values of eltime in a multi-value list. Then, you should be able to get the maximum. like for example:

|transaction eltime delim="," mvlist=eltime|eval maximum_eltime=max(eltime)|table maximum_eltime

0 Karma

sajbutler
Path Finder

Doesn't quite work the way I want it to. I want to determine the maximum value of eltime for each event (there are multiple instances of eltime for each event - This is because each event is an output of the transaction command)

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...