Splunk Search

Search query - where after stats count command

shayhibah
Path Finder

I'm trying to count the value of "name" field and to show results only where the count is greater than 1.

My query is: | stats count by name| where count > 1

What am I missing? 😮

Thanks

Tags (1)

martin_mueller
SplunkTrust
SplunkTrust

The search looks correct if you want "count events for each value of the name field, and only show name field values that occur more than once".

If that's not what you're looking for, do elaborate more what your actual use case is.

martin_mueller
SplunkTrust
SplunkTrust

Got a screenshot that includes your search and results with count=1?

0 Karma

shayhibah
Path Finder

Thats exatcly what I want.
The problem is that I can find events on the results that their count equals to 1.

Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...