<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the difference between rare vs stats values(field) count? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434966#M124055</link>
    <description>&lt;P&gt;Yeah thats is why I tried to compare least common values of a field with distinct values of the field in descending order. The results seem to be the same now.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jul 2018 14:05:36 GMT</pubDate>
    <dc:creator>danielwysockiar</dc:creator>
    <dc:date>2018-07-11T14:05:36Z</dc:date>
    <item>
      <title>What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434962#M124051</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
I'm trying to find least common agent useing two commands:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1) sourcetype=access_combined| rare  useragent
2) sourcetype=access_combined| stats values(useragent)  count by useragent | sort count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And I get different results, because second one finds more results.&lt;/P&gt;

&lt;P&gt;Can someone please clarify the difference in the way those commands work?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 13:16:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434962#M124051</guid>
      <dc:creator>danielwysockiar</dc:creator>
      <dc:date>2018-07-11T13:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434963#M124052</link>
      <description>&lt;P&gt;Could it be because you ran it after the rare search, and by then the results were different due to additional data coming in?  I would make a dashboard with both searches, each in their own panel, that way they run at the same time.  Or, rerun the first search to see if that searches results have changed as well.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 13:50:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434963#M124052</guid>
      <dc:creator>kmorris_splunk</dc:creator>
      <dc:date>2018-07-11T13:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434964#M124053</link>
      <description>&lt;P&gt;Edit : Done one dashboard with shared time-picker and the results are the same &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
Must have been my mistake.&lt;BR /&gt;
Thanks.&lt;/P&gt;

&lt;P&gt;That was my idea at first, so I've set a time-picker to show results from the same hour and run commands.&lt;BR /&gt;
Still the same difference. &lt;BR /&gt;
Must be something in the way those commands work, but can not find any detailed info on the mechanism.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 13:55:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434964#M124053</guid>
      <dc:creator>danielwysockiar</dc:creator>
      <dc:date>2018-07-11T13:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434965#M124054</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;As mentioned in the documentation, &lt;CODE&gt;rare&lt;/CODE&gt; displays the least common values of a field and by default displays "rare" 10 values. If the  "by clause" is specified, this command returns rare tuples of values for each distinct tuple of values of the group-by fields.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Rare"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Rare&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Whereas &lt;CODE&gt;values&lt;/CODE&gt; returns the list of all distinct values of the field X as a multivalue entry. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Multivaluefunctions#values.28X.29"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Multivaluefunctions#values.28X.29&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;In short &lt;CODE&gt;rare&lt;/CODE&gt; is opposite of &lt;CODE&gt;top&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 13:59:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434965#M124054</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-11T13:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434966#M124055</link>
      <description>&lt;P&gt;Yeah thats is why I tried to compare least common values of a field with distinct values of the field in descending order. The results seem to be the same now.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 14:05:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434966#M124055</guid>
      <dc:creator>danielwysockiar</dc:creator>
      <dc:date>2018-07-11T14:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: What is the difference between rare vs stats values(field) count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434967#M124056</link>
      <description>&lt;P&gt;Rare defaults to the 10 rarest so the percentages will be all wrong; these should be the same&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=access_combined| rare 9999 useragent
sourcetype=access_combined| stats count BY useragent | sort 9999 count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And these:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=access_combined| rare useragent
sourcetype=access_combined| stats count BY useragent | sort 10 count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 11 Jul 2018 15:40:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-difference-between-rare-vs-stats-values-field-count/m-p/434967#M124056</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-11T15:40:55Z</dc:date>
    </item>
  </channel>
</rss>

