<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to return only values that are not unique? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325557#M60505</link>
    <description>&lt;P&gt;Currently forwarding all Windows Application Logs with even ID 1000 (AppCrash Event) to splunk. Using this search allows me to see what the top crashing applications in my environment are: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=1000 | top limit=50 Faulting_application_path
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My problem is many of these events only a single computer is reporting the event so makes it look like a bigger issue when it's not. Is there a way I can do that same search but only if the "ComputerName" value is not unique? Perhaps even something like | where ComputerName &amp;gt; 5?&lt;/P&gt;

&lt;P&gt;Here is an example event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;02/28/2018 12:06:32 PM
LogName=Application
SourceName=Application Error
EventCode=1000
EventType=2
Type=Error
ComputerName=ComputerName1.mydomain.com
TaskCategory=Application Crashing Events
OpCode=Info
RecordNumber=272812
Keywords=Classic
Message=Faulting application name: CcmExec.exe, version: 5.0.8577.1108, time stamp: 0x5a5e6659
Faulting module name: KERNELBASE.dll, version: 10.0.16299.15, time stamp: 0x4736733c
Exception code: 0xe06d7363
Fault offset: 0x0000000000013fb8
Faulting process id: 0x4a8c
Faulting application start time: 0x01d3b0b67a98d2b3
Faulting application path: C:\WINDOWS\CCM\CcmExec.exe
Faulting module path: C:\WINDOWS\System32\KERNELBASE.dll
Report Id: f6e1ae09-3d16-4ba0-addf-98b1b999927c
Faulting package full name: 
Faulting package-relative application ID:
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;TIA!&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2018 17:20:03 GMT</pubDate>
    <dc:creator>Nitroxeno</dc:creator>
    <dc:date>2018-02-28T17:20:03Z</dc:date>
    <item>
      <title>How to return only values that are not unique?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325557#M60505</link>
      <description>&lt;P&gt;Currently forwarding all Windows Application Logs with even ID 1000 (AppCrash Event) to splunk. Using this search allows me to see what the top crashing applications in my environment are: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=1000 | top limit=50 Faulting_application_path
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My problem is many of these events only a single computer is reporting the event so makes it look like a bigger issue when it's not. Is there a way I can do that same search but only if the "ComputerName" value is not unique? Perhaps even something like | where ComputerName &amp;gt; 5?&lt;/P&gt;

&lt;P&gt;Here is an example event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;02/28/2018 12:06:32 PM
LogName=Application
SourceName=Application Error
EventCode=1000
EventType=2
Type=Error
ComputerName=ComputerName1.mydomain.com
TaskCategory=Application Crashing Events
OpCode=Info
RecordNumber=272812
Keywords=Classic
Message=Faulting application name: CcmExec.exe, version: 5.0.8577.1108, time stamp: 0x5a5e6659
Faulting module name: KERNELBASE.dll, version: 10.0.16299.15, time stamp: 0x4736733c
Exception code: 0xe06d7363
Fault offset: 0x0000000000013fb8
Faulting process id: 0x4a8c
Faulting application start time: 0x01d3b0b67a98d2b3
Faulting application path: C:\WINDOWS\CCM\CcmExec.exe
Faulting module path: C:\WINDOWS\System32\KERNELBASE.dll
Report Id: f6e1ae09-3d16-4ba0-addf-98b1b999927c
Faulting package full name: 
Faulting package-relative application ID:
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;TIA!&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 17:20:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325557#M60505</guid>
      <dc:creator>Nitroxeno</dc:creator>
      <dc:date>2018-02-28T17:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to return only values that are not unique?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325558#M60506</link>
      <description>&lt;P&gt;Try something like this. Also try to include at least one metadata field (index sourcetype source host) in your base search for better performance.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=1000  | stats count dc(ComputerName) as ComputerName by Faulting_application_path | where ComputerName&amp;gt;5
| sort 50 -count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 28 Feb 2018 17:33:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325558#M60506</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-02-28T17:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to return only values that are not unique?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325559#M60507</link>
      <description>&lt;P&gt;That did the trick! Thank you very much!&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 17:42:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-return-only-values-that-are-not-unique/m-p/325559#M60507</guid>
      <dc:creator>Nitroxeno</dc:creator>
      <dc:date>2018-02-28T17:42:19Z</dc:date>
    </item>
  </channel>
</rss>

