Splunk Search

How to find top results by another field while including time in the table output?

jfreund
Explorer

Hey folks, I have data formatted as follows

time fielda fieldb

I want to find the top 3 values of fielda for each of fieldb, but for each result I need to know the time for which the top value occurred.

I found I can use top to get the top 3 fielda by fieldb, yet time is stripped from the table:
|top limit=3 fielda by fieldb

Is there a way to use top to maintain that data, or perhaps an alternative command or set of commands I can use to get what I'm looking for?

Tags (1)
0 Karma

lguinn2
Legend

Try this:

yoursearchhere
| sort 0 fieldb -fielda
| eval counter=1
| streamstats current=true global=f sum(counter) as index by fieldb
| where index < 4
| table fieldb fielda _time
0 Karma

jfreund
Explorer

The data set includes a time value for each entry (hence the "time" field I listed in line 2 of my inquiry). That is the time of the entry containing fielda and fieldb. So I want that field maintained in the resulting top output. It could be time or anything else really.

0 Karma

somesoni2
Revered Legend

Do you mean maximum value instead of top value for fielda?

0 Karma

lguinn2
Legend

I think that is what jfreund meant

0 Karma

lguinn2
Legend

What do you mean by "when the top value occurred"? The top command counts the number of events for each value of fielda and fieldb. Therefore the count covers a number of events, not just one. You could use the time of the first event for each value, or the last event or even something else ...

0 Karma
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...