Splunk Search

list "top" command question

dikaye
Path Finder

Hi, My mail server logs display recipient info like that:

Feb 14 16:04:25 224.67.24.175 Feb 14 16:04:25 mail_logs: Info: MID 1563086 ICID 1105367 RID 0 To: <user.1@abc.com>

How can I list the top 10 recipients by search command?

Thanks.

Tags (1)
0 Karma

Ron_Naken
Splunk Employee
Splunk Employee

You need to remove the : from To in your search.

Also... If you haven't trained Splunk to recognize your To field, you'll want to run the IFX wizard to extract the field. Here's a link on how to do this:

http://www.splunk.com/base/Documentation/4.1.7/User/InteractiveFieldExtractionExample

dikaye
Path Finder

I create it as the savedsearches.conf like that:

[Top recipients - pie chart]
action.email.sendresults = 0
dispatch.ttl = 3600
displayview = report_builder_display
relation = None
request.ui_dispatch_view = report_builder_display
search = index=all_test host=224.67.24.175 | top To: limit=10
vsid = *:fwkfzepj

But, when I run this saved search, it has not thing display.

Why?

0 Karma

Ron_Naken
Splunk Employee
Splunk Employee

Assuming you have your fields extracted properly:

... | top limit=10 To
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...