<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Returning results only if field has more than one unique name in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257584#M189532</link>
    <description>&lt;P&gt;If you add &lt;CODE&gt;table computer_name computerCount&lt;/CODE&gt; after the &lt;CODE&gt;where&lt;/CODE&gt; command, do you see output?  Do you see events in Verbose Mode?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2015 18:05:32 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2015-12-02T18:05:32Z</dc:date>
    <item>
      <title>Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257579#M189527</link>
      <description>&lt;P&gt;I am looking to create a unique alert that would look at virus activity. The idea is to get a real time alert in a 60 second window if the field signature is reoccurring across two separate logs that both have different (computer_name) which could signal an outbreak possibly. &lt;/P&gt;

&lt;P&gt;signature is the indicator of what type of virus it is and computer_name is the comp name. &lt;BR /&gt;
This is the general idea: ...| bucket _time span=1m | dedup signature | (Only return results if computer_name has different results)   | count &amp;gt;2 &lt;/P&gt;

&lt;P&gt;I cant seem to figure out a splunk command to only return results if the computer_name field does not have a unique specific name. I know I could utilize != but not sure what command would help me with this. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:02:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257579#M189527</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2020-09-29T08:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257580#M189528</link>
      <description>&lt;P&gt;How about something like this.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...| bucket _time span=1m | stats count(computer_name) as computerCount by signature | where computerCount &amp;gt; 2 | ...
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 27 Nov 2015 20:44:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257580#M189528</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-11-27T20:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257581#M189529</link>
      <description>&lt;P&gt;Not sure if it works. Its saying there are events but no results are being outputted &lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2015 21:23:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257581#M189529</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-11-27T21:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257582#M189530</link>
      <description>&lt;P&gt;Try my modified answer.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Nov 2015 00:51:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257582#M189530</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-11-28T00:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257583#M189531</link>
      <description>&lt;P&gt;The logic makes sense but Splunk says I have 8 results but nothing being outputted.  Just running a basic query against the source type I have the same amount of events in a given period as what the alert is telling me &lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 13:57:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257583#M189531</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-12-02T13:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257584#M189532</link>
      <description>&lt;P&gt;If you add &lt;CODE&gt;table computer_name computerCount&lt;/CODE&gt; after the &lt;CODE&gt;where&lt;/CODE&gt; command, do you see output?  Do you see events in Verbose Mode?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 18:05:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257584#M189532</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-12-02T18:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257585#M189533</link>
      <description>&lt;P&gt;I get a count of computers but nothing on the left hand side under computer_name &lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 14:47:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257585#M189533</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-12-04T14:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257586#M189534</link>
      <description>&lt;P&gt;Try changing the stats command to &lt;CODE&gt;stats values(computer_name) as Computers count(computer_name) as computerCount by signature&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 14:58:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257586#M189534</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-12-04T14:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257587#M189535</link>
      <description>&lt;P&gt;Seems I have solid output. Over a given 24 hours I have 4 different signatures where each signature has multiple computers and on the right hand side is a total count. What seems weird is if there are only 2 computers for one signature the total computer count is 15. This probably means 15 total events in-between those two 2 computers. &lt;/P&gt;

&lt;P&gt;What I am seeing though is one signature for one computer. I should only be seeing output if there are a total of two computers found for that signature.  computerCount &amp;gt;2 should be taking care of that it seems. &lt;/P&gt;

&lt;P&gt;Edit: Just noticed computerCount &amp;gt;2 will activate if one computer pops up multiple times in a 60 second window &lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 16:19:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257587#M189535</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-12-04T16:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Returning results only if field has more than one unique name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257588#M189536</link>
      <description>&lt;P&gt;Got it. Verified the results and im good to go. Thanks! &lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 20:38:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Returning-results-only-if-field-has-more-than-one-unique-name/m-p/257588#M189536</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-12-04T20:38:42Z</dc:date>
    </item>
  </channel>
</rss>

