Splunk Search

How do i find the most common events in my search?

RicoSuave
Builder

As a splunk user, i want to find the most common events in my search results. How would I accomplish this? I am trying to determine what are the top 5 or 10 most common log messages coming into splunk.

Tags (2)
1 Solution

RicoSuave
Builder

This should do the trick

| cluster | table cluster_count, _raw | sort - cluster_count

Reference the docs for the cluster command here: http://docs.splunk.com/Documentation/Splunk/4.3.2/SearchReference/Cluster

View solution in original post

RicoSuave
Builder

This should do the trick

| cluster | table cluster_count, _raw | sort - cluster_count

Reference the docs for the cluster command here: http://docs.splunk.com/Documentation/Splunk/4.3.2/SearchReference/Cluster

jwelsh_splunk
Splunk Employee
Splunk Employee

Please note to get the table to show the count properly your search should include showcount=t, or:

| cluster showcount=t| table cluster_count, _raw | sort - cluster_count

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...