Splunk Search

How to display the 1st 10 lines in events

jackueline14
New Member

Hi,

I have Error logs which is having more than 50 lines but requirement is to be displayed for 1st 10 lines instead more than 50 and there is no common statement in each events to write it in the regex. So, Kindly help.

Labels (1)
Tags (1)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

If your _raw string has multi line events, then this rex statement will create a new field with the first 10 lines into a new field called display

| rex "(?<didplay>((?m)^.*$\n){10})"
0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...