Splunk Search

how to find most popular field over time ?

tariqazeem123
New Member

i have data in default index "main" and has sourcetype "app" and field like program_name.

i want to find most popular programmes over time. can anybody please help me with this ?

0 Karma
1 Solution

snigdhasaxena
Communicator

Hi @tariqazeem123 ,

There are 2 ways:
1. You can run your command and use sort command
index=main sourcetype=app | sort program_name by _time

2.You can use top command and you can limit it to no. of events you want

index=main sourcetype=app | top limit=0 program_name

View solution in original post

0 Karma

snigdhasaxena
Communicator

Hi @tariqazeem123 ,

There are 2 ways:
1. You can run your command and use sort command
index=main sourcetype=app | sort program_name by _time

2.You can use top command and you can limit it to no. of events you want

index=main sourcetype=app | top limit=0 program_name

0 Karma

amitm05
Builder

Hi @tariqazeem123
You would like to use the top command for this -

index=main sourcetype=app| top limit=0 program_name 

Let me know if there is more to your query. Thanks

0 Karma
Get Updates on the Splunk Community!

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...