Splunk Search

How do I extract top values by a specific field and have them display along with corresponding fields in a table command?

nivekko
New Member
index=* sourcetype=* host=*  | search Event=176 | top limit=20 User| table Location, Event, User, Address, Time

It displays the table but my columns with the fields Location, User, Address and Time appear to be empty. Any reason why?

0 Karma

sundareshr
Legend

Try this

index=* sourcetype=* host=*  Event=176 | stats count list(Location) as L, list(Event) as e, list(Address) as a, list(_time) as t  by User | sort 20 - count | eval z=mvzip(l, mvzip(e, mvzip(a, t))) | rex field=z "(?<Location>[^\,]+)\,(?<Event>[^\,]+)\,(?<Address>[^\,]+)\,(?<Time>.*) | eval Time=strftime(Time, "%x %X") | table Location, Event, User, Address, Time
0 Karma
Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...