Also it would be great if anyone can lgive a search query to list out the top 10 hosts with those events?
Thanks in advance
as already asked renjith.nair, Splunk always gives a timestamp to every log, you cannot have logs without timestamp.
I assume that you are using Splunk to create reports on non-event data probably from a DB (we sometimes used Splunk to do this).
In this case you have to know the period in which you ingested the data and use this time in the timerange to use in the the search.
After this you have to create a normal search like
index=my_index | top 10 host
Bye.
Giuseppe
as already asked renjith.nair, Splunk always gives a timestamp to every log, you cannot have logs without timestamp.
I assume that you are using Splunk to create reports on non-event data probably from a DB (we sometimes used Splunk to do this).
In this case you have to know the period in which you ingested the data and use this time in the timerange to use in the the search.
After this you have to create a normal search like
index=my_index | top 10 host
Bye.
Giuseppe
Sorry but what you mean by events without date? Splunk assigns timestamp while it index data even though you haven't provide any timestamp. Could you please provide an example ?
http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/HowSplunkextractstimestamps