Splunk Search

Why do I only see 10 results/columns in my count table?

Mick
Splunk Employee
Splunk Employee

When I run this search -

source="*conn.log" | rex field=_raw "\.IP = '(?<connectionIp>[^']+)" | fields host, connectionIp | chart count by host, connectionIp

The resulting chart only shows me 10 IP addresses, but I know there are more in there. How do I get it to show me more?

1 Solution

Mick
Splunk Employee
Splunk Employee

By default, the table produced by the count command will only show you the top 10 results (columns) and then group the rest into the 'Other' column. To increase the number of columns in the table, append 'limit=x' to the end of your search, where 'x' is the number of columns you want to see.

View solution in original post

Mick
Splunk Employee
Splunk Employee

By default, the table produced by the count command will only show you the top 10 results (columns) and then group the rest into the 'Other' column. To increase the number of columns in the table, append 'limit=x' to the end of your search, where 'x' is the number of columns you want to see.

Get Updates on the Splunk Community!

What’s New in Splunk Cloud Platform 9.1.2308?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2308! Analysts can ...

Index This | Why do they call it hyper text?

November 2023 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

State of Splunk Careers 2023: Career Resilience and the Continued Value of Splunk

For the past three years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...