Splunk Search

Need to extract latest value from multiple matches?

thiru25
Explorer

Hello, The following query results in multiple results when the where condition(where msgdiff=dailypeak) is met but I want just latest result, please help?

index="ContentGateway" sourcetype=Messagestats  host="cg1-e-fid-bos-l1" 
| streamstats current=t window=2 global=f allnum=t range(Messages) as msgdiff by host source
| eval msgdiff=msgdiff/5
| rex field=source "/home/activ/ContentGateway/log/updates/MessageStatistics.(?<feed>\w*(?!\d)\w)"
| bin _time span=5s
| stats sum(msgdiff) as msgdiff by _time feed
| eventstats max(msgdiff) as dailypeak by feed 
| where msgdiff=dailypeak
| table  feed dailypeak _time

thanks,
Thiru.

Tags (1)
0 Karma
1 Solution

jonuwz
Influencer

replace

| table  feed dailypeak _time

with

| stats max(_time) as _time by feed dailypeak

View solution in original post

0 Karma

jonuwz
Influencer

replace

| table  feed dailypeak _time

with

| stats max(_time) as _time by feed dailypeak
0 Karma
Get Updates on the Splunk Community!

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...