<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: stats values in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499381#M139082</link>
    <description>&lt;P&gt;Hi @vumanhtai,&lt;BR /&gt;
let me understand, do you want to have session_IDs where: &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;there's a severity value greater than 2,&lt;/LI&gt;
&lt;LI&gt;there are more than 2 different severity values?&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;In the first case, try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail sourcetype=webmail 
| stats values(time) as time maxs(severity) as severity values(email) as email values(status) by session_ID
| where severity&amp;gt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In the second case, try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail sourcetype=webmail 
| stats values(time) as time values(severity) as severity dc(severity) as dc_severity values(email) as email values(status) by session_ID
| where dc_severity&amp;gt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Tue, 24 Mar 2020 08:28:59 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-03-24T08:28:59Z</dc:date>
    <item>
      <title>stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499378#M139079</link>
      <description>&lt;P&gt;Hi Splunk Team!&lt;BR /&gt;
i have a query: index=mail sourcetype=webmail |  stats values(time) as time values(severity) as severity values(email) as email  values(status) by session_ID&lt;BR /&gt;
Results as shown in a picture&lt;BR /&gt;
i want to show result of values (severity) greater than 2 values?&lt;BR /&gt;
how can i do it?&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 08:04:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499378#M139079</guid>
      <dc:creator>vumanhtai</dc:creator>
      <dc:date>2020-03-24T08:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499379#M139080</link>
      <description>&lt;P&gt;@vumanhtai &lt;/P&gt;

&lt;P&gt;Are you looking for this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;YOUR_SEARCH | where mvcount(severity) &amp;gt; 2
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 24 Mar 2020 08:24:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499379#M139080</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2020-03-24T08:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499380#M139081</link>
      <description>&lt;P&gt;Thank you so much!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 08:26:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499380#M139081</guid>
      <dc:creator>vumanhtai</dc:creator>
      <dc:date>2020-03-24T08:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499381#M139082</link>
      <description>&lt;P&gt;Hi @vumanhtai,&lt;BR /&gt;
let me understand, do you want to have session_IDs where: &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;there's a severity value greater than 2,&lt;/LI&gt;
&lt;LI&gt;there are more than 2 different severity values?&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;In the first case, try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail sourcetype=webmail 
| stats values(time) as time maxs(severity) as severity values(email) as email values(status) by session_ID
| where severity&amp;gt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In the second case, try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail sourcetype=webmail 
| stats values(time) as time values(severity) as severity dc(severity) as dc_severity values(email) as email values(status) by session_ID
| where dc_severity&amp;gt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 08:28:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499381#M139082</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-03-24T08:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499382#M139083</link>
      <description>&lt;P&gt;thank you&lt;BR /&gt;
kamlesh_vaghela's answer helped me solve this problem&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 08:45:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499382#M139083</guid>
      <dc:creator>vumanhtai</dc:creator>
      <dc:date>2020-03-24T08:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: stats values</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499383#M139084</link>
      <description>&lt;P&gt;@vumanhtai&lt;/P&gt;

&lt;P&gt;Glad to help you. Please accept this answer to close this question. &lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 11:39:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-values/m-p/499383#M139084</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2020-03-24T11:39:59Z</dc:date>
    </item>
  </channel>
</rss>

