<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Where following a dc(field) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309496#M92843</link>
    <description>&lt;P&gt;I am looking at a firewall. I am trying to find only results where there are more than 20 distinct ports per source. &lt;/P&gt;

&lt;P&gt;stats dc(port) by soure_ipaddr&lt;/P&gt;

&lt;P&gt;I would like to use something like a where command. I was thinking of using a | where dc(port) &amp;gt; 20, but I get an error when I try that. What should I do to convert the results of the dc(port) to a value that where can use?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Nov 2017 20:36:03 GMT</pubDate>
    <dc:creator>stakor</dc:creator>
    <dc:date>2017-11-30T20:36:03Z</dc:date>
    <item>
      <title>Where following a dc(field)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309496#M92843</link>
      <description>&lt;P&gt;I am looking at a firewall. I am trying to find only results where there are more than 20 distinct ports per source. &lt;/P&gt;

&lt;P&gt;stats dc(port) by soure_ipaddr&lt;/P&gt;

&lt;P&gt;I would like to use something like a where command. I was thinking of using a | where dc(port) &amp;gt; 20, but I get an error when I try that. What should I do to convert the results of the dc(port) to a value that where can use?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 20:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309496#M92843</guid>
      <dc:creator>stakor</dc:creator>
      <dc:date>2017-11-30T20:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Where following a dc(field)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309497#M92844</link>
      <description>&lt;P&gt;You would need to use &lt;CODE&gt;eventstats&lt;/CODE&gt; command to calculate dc(port) per source_ipaddr (adding another field without reducing/filtering) and then apply your where clause. like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search 
| eventstats dc(port) as ports by soure_ipaddr
| where ports&amp;gt;20
| ...rest of the search 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 30 Nov 2017 20:42:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309497#M92844</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-11-30T20:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Where following a dc(field)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309498#M92845</link>
      <description>&lt;P&gt;&lt;CODE&gt;dc(port) as total .... | where total &amp;gt; 20&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 20:43:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309498#M92845</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-11-30T20:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Where following a dc(field)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309499#M92846</link>
      <description>&lt;P&gt;is it possible to apply on the filters the dc(account_id) for example ?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 09:00:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Where-following-a-dc-field/m-p/309499#M92846</guid>
      <dc:creator>diegofavoretto</dc:creator>
      <dc:date>2019-01-03T09:00:55Z</dc:date>
    </item>
  </channel>
</rss>

