<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Increase count of events but no field results show up in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404584#M117019</link>
    <description>&lt;P&gt;When searching with this sample query, results show up like below&lt;/P&gt;

&lt;P&gt;index=abc sourcetype=def 1.1.1.1 &lt;/P&gt;

&lt;P&gt;For example, field1 has the following values:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6851i5DFC7699F7699CDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;field2:&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6852iBD11735754ECCBBD/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Since each IP needs to be displayed, I wrote this query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|eval temp=split(field1,",+") | eval IP1=mvindex(temp,0) | eval IP2=mvindex(temp,1) | eval IP3=mvindex(temp,2)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But there's also a requirement to search for total events &amp;gt;= 1000 and still able to display the 3 IPs in a table along with values(field2). When I use count &amp;gt;= 5, results are displayed, but when I use count &amp;gt;= 1000, the results are not. For example: below is expected result&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time   IP1 IP2 IP3 field2
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.9 /ccss/custom/etc    
                                                     /ccss/custom/etc1
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.10    /ccss/custom/etc      
                                                    /ccss/custom/etc2
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.11     /ccss/custom/etc      
                                                   /ccss/custom/etc3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;HR /&gt;

&lt;P&gt;This is my query so far:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=abc sourcetype=def 1.1.1.1 
   |eval temp=split(field1,",+") | eval IP1=mvindex(temp,0) | eval IP2=mvindex(temp,1) | eval IP3=mvindex(temp,2)
 | stats values(field2) as field2 count(field1) as event_count by IP1 IP2 IP3 _time | where event_count &amp;gt;=1000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 10 Apr 2019 17:49:10 GMT</pubDate>
    <dc:creator>superstarmd</dc:creator>
    <dc:date>2019-04-10T17:49:10Z</dc:date>
    <item>
      <title>Increase count of events but no field results show up</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404584#M117019</link>
      <description>&lt;P&gt;When searching with this sample query, results show up like below&lt;/P&gt;

&lt;P&gt;index=abc sourcetype=def 1.1.1.1 &lt;/P&gt;

&lt;P&gt;For example, field1 has the following values:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6851i5DFC7699F7699CDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;field2:&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6852iBD11735754ECCBBD/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Since each IP needs to be displayed, I wrote this query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|eval temp=split(field1,",+") | eval IP1=mvindex(temp,0) | eval IP2=mvindex(temp,1) | eval IP3=mvindex(temp,2)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But there's also a requirement to search for total events &amp;gt;= 1000 and still able to display the 3 IPs in a table along with values(field2). When I use count &amp;gt;= 5, results are displayed, but when I use count &amp;gt;= 1000, the results are not. For example: below is expected result&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time   IP1 IP2 IP3 field2
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.9 /ccss/custom/etc    
                                                     /ccss/custom/etc1
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.10    /ccss/custom/etc      
                                                    /ccss/custom/etc2
4/8/2019 23:16  1.1.1.1 2.3.4.5 6.7.8.11     /ccss/custom/etc      
                                                   /ccss/custom/etc3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;HR /&gt;

&lt;P&gt;This is my query so far:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=abc sourcetype=def 1.1.1.1 
   |eval temp=split(field1,",+") | eval IP1=mvindex(temp,0) | eval IP2=mvindex(temp,1) | eval IP3=mvindex(temp,2)
 | stats values(field2) as field2 count(field1) as event_count by IP1 IP2 IP3 _time | where event_count &amp;gt;=1000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 10 Apr 2019 17:49:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404584#M117019</guid>
      <dc:creator>superstarmd</dc:creator>
      <dc:date>2019-04-10T17:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: Increase count of events but no field results show up</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404585#M117020</link>
      <description>&lt;P&gt;You may not be aware that all the &lt;CODE&gt;*stats&lt;/CODE&gt; commands and functions are multivalue-aware/safe, so try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=abc sourcetype=def 1.1.1.1 
|eval IP=split(field1,",+")
| stats values(field2) AS field2 count(field1) AS event_count BY IP _time
| where event_count &amp;gt;=1000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am skeptical that you need the &lt;CODE&gt;_time&lt;/CODE&gt; there, but I am trusting you on that part.  Perhaps this is more what you need?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=abc sourcetype=def 1.1.1.1 
|eval IP=split(field1,",+")
| stats count AS event_count BY IP field1
| stats list(*) AS * sum(event_count) AS total_event_count BY IP
| where total_event_count &amp;gt;=1000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 11 Apr 2019 00:06:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404585#M117020</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-04-11T00:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: Increase count of events but no field results show up</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404586#M117021</link>
      <description>&lt;P&gt;I still got the "No results found." message even though there are more than 1000 events found..When I lowered it to 5 I got some results.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 12:51:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Increase-count-of-events-but-no-field-results-show-up/m-p/404586#M117021</guid>
      <dc:creator>superstarmd</dc:creator>
      <dc:date>2019-04-11T12:51:29Z</dc:date>
    </item>
  </channel>
</rss>

