Splunk Search

Search for top results

JelianeL
Explorer

| eval totalCount = cCounter + lCounter

| eventstats max(totalCount) as maxTotal

| table id, time, message, cCounter, lCounter, totalCount

| sort -totalCount

Hi 😃 my current search command is as above.

How do I actually display only top 5 totalCount? I trying adding "top 5 totalCount", but does not work.

Tags (1)
0 Karma
1 Solution

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

View solution in original post

Ayn
Legend

First of all I don't think that's your whole search?

Also, I don't know what you mean by top 5 - do you want to get just the first 5 results? In that case just add a | head 5 at the end and you should be done.

Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...