<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using event count with a table in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752507#M242654</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Here is my current search:&lt;/P&gt;&lt;P&gt;source=health.log REGION=region1 STATE=down TYPE=type1&lt;/P&gt;&lt;P&gt;What I want to do: I want the table to only display results if the region/state/type combination has happened 5 times in the past hour.&lt;/P&gt;&lt;P&gt;I tried using stats count, but I couldn't get it to work and also use table to output the multiple fields.&lt;/P&gt;&lt;P&gt;I must be not understanding something because this seems like it should be fairly easy to do...&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 18:59:49 GMT</pubDate>
    <dc:creator>thisemailwillbe</dc:creator>
    <dc:date>2025-08-29T18:59:49Z</dc:date>
    <item>
      <title>Using event count with a table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752507#M242654</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Here is my current search:&lt;/P&gt;&lt;P&gt;source=health.log REGION=region1 STATE=down TYPE=type1&lt;/P&gt;&lt;P&gt;What I want to do: I want the table to only display results if the region/state/type combination has happened 5 times in the past hour.&lt;/P&gt;&lt;P&gt;I tried using stats count, but I couldn't get it to work and also use table to output the multiple fields.&lt;/P&gt;&lt;P&gt;I must be not understanding something because this seems like it should be fairly easy to do...&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 18:59:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752507#M242654</guid>
      <dc:creator>thisemailwillbe</dc:creator>
      <dc:date>2025-08-29T18:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using event count with a table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752508#M242655</link>
      <description>&lt;LI-CODE lang="markup"&gt;source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count &amp;gt;= 5&lt;/LI-CODE&gt;&lt;P&gt;or, if you want the events which are included in these stats&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count &amp;gt;= 5&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 29 Aug 2025 19:03:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752508#M242655</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2025-08-29T19:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: Using event count with a table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752509#M242656</link>
      <description>&lt;P&gt;Thanks! This was a really easy solution, I don't know why I didn't think of doing multiple fields...&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 19:18:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-event-count-with-a-table/m-p/752509#M242656</guid>
      <dc:creator>thisemailwillbe</dc:creator>
      <dc:date>2025-08-29T19:18:30Z</dc:date>
    </item>
  </channel>
</rss>

