<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a search to get it to display results when count of IP Address is exactly 2? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601279#M209273</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;I already have a query below that gives me a table similar to the one on bottom.&amp;nbsp; I was wondering if there is a way to get it to display results when count of IP Address is exactly 2?&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Meaning show results when IP address = 2 otherwise dont show it.&amp;nbsp; So 3rd entry should not show but first two should.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know if any ideas.&amp;nbsp; Appreciate your helps in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;index=EventLog source=security EventCode=4771&lt;BR /&gt;| stats count values(source) AS IP_Address BY Account_Name EventID Message&lt;BR /&gt;| where count &amp;gt; 20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="872"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="138"&gt;Account_Name&lt;/TD&gt;
&lt;TD width="107"&gt;EventID&lt;/TD&gt;
&lt;TD width="286"&gt;Message&lt;/TD&gt;
&lt;TD width="137"&gt;Count&lt;/TD&gt;
&lt;TD width="204"&gt;IP Address&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SmithA&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;5000&lt;/TD&gt;
&lt;TD width="204"&gt;1.1.1.1&lt;BR /&gt;2.2.2.2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;JohnsonX&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;6000&lt;/TD&gt;
&lt;TD width="204"&gt;3.3.3.3&lt;BR /&gt;4.4.4.4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;washingtonZ&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;7000&lt;/TD&gt;
&lt;TD&gt;5.5.5.5&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Fri, 10 Jun 2022 04:51:43 GMT</pubDate>
    <dc:creator>aikn061</dc:creator>
    <dc:date>2022-06-10T04:51:43Z</dc:date>
    <item>
      <title>How to create a search to get it to display results when count of IP Address is exactly 2?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601279#M209273</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;I already have a query below that gives me a table similar to the one on bottom.&amp;nbsp; I was wondering if there is a way to get it to display results when count of IP Address is exactly 2?&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Meaning show results when IP address = 2 otherwise dont show it.&amp;nbsp; So 3rd entry should not show but first two should.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know if any ideas.&amp;nbsp; Appreciate your helps in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;index=EventLog source=security EventCode=4771&lt;BR /&gt;| stats count values(source) AS IP_Address BY Account_Name EventID Message&lt;BR /&gt;| where count &amp;gt; 20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="872"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="138"&gt;Account_Name&lt;/TD&gt;
&lt;TD width="107"&gt;EventID&lt;/TD&gt;
&lt;TD width="286"&gt;Message&lt;/TD&gt;
&lt;TD width="137"&gt;Count&lt;/TD&gt;
&lt;TD width="204"&gt;IP Address&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SmithA&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;5000&lt;/TD&gt;
&lt;TD width="204"&gt;1.1.1.1&lt;BR /&gt;2.2.2.2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;JohnsonX&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;6000&lt;/TD&gt;
&lt;TD width="204"&gt;3.3.3.3&lt;BR /&gt;4.4.4.4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;washingtonZ&lt;/TD&gt;
&lt;TD&gt;4771&lt;/TD&gt;
&lt;TD&gt;Kerberos pre-authentication failed&lt;/TD&gt;
&lt;TD&gt;7000&lt;/TD&gt;
&lt;TD&gt;5.5.5.5&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Fri, 10 Jun 2022 04:51:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601279#M209273</guid>
      <dc:creator>aikn061</dc:creator>
      <dc:date>2022-06-10T04:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: When count = 1</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601284#M209277</link>
      <description>&lt;P&gt;Use the &lt;FONT face="courier new,courier"&gt;mvcount&lt;/FONT&gt; function to find the number of IP addresses.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=EventLog source=security EventCode=4771
| stats count values(source) AS IP_Address BY Account_Name EventID Message
| where (count &amp;gt; 20 AND mvcount(IP_Address)=2)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 00:32:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601284#M209277</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-06-10T00:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: When count = 1</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601286#M209279</link>
      <description>&lt;P&gt;Thank you!&amp;nbsp; Worked like a charm.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 00:40:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-get-it-to-display-results-when-count/m-p/601286#M209279</guid>
      <dc:creator>aikn061</dc:creator>
      <dc:date>2022-06-10T00:40:26Z</dc:date>
    </item>
  </channel>
</rss>

