Splunk Enterprise Security

count/ subtotal for stats values.

shivarpith
Path Finder

Hi,

We have a query that brings up the sourcetypes in correlated search using "tstats" Example: tsats datamodel xyz values(sourcetype) as sourcetype by host

result

sourcetype host


sourcetype 1 ABCDtest
sourcetype 2
.
.
.
.
sourcetype 1 ABCDtest

task here is i need tehe events where sourcetypes listed are more than one for a host and show up only those

Requirement

sourcetype host


sourcetype 1 ABCDtest
sourcetype 2

it should be something like addtotals or sum of sourcetype and like where sourcetype>1

Thanks in advance.

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Add dc(sourcetype) as dc to your tstats, and add | where dc > 1 to your search pipeline.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Add dc(sourcetype) as dc to your tstats, and add | where dc > 1 to your search pipeline.

shivarpith
Path Finder

Thanks that works 🙂

0 Karma
Get Updates on the Splunk Community!

Database Performance Sidebar Panel Now on APM Database Query Performance & Service ...

We’ve streamlined the troubleshooting experience for database-related service issues by adding a database ...

IM Landing Page Filter - Now Available

We’ve added the capability for you to filter across the summary details on the main Infrastructure Monitoring ...

Dynamic Links from Alerts to IM Navigators - New in Observability Cloud

Splunk continues to improve the troubleshooting experience in Observability Cloud with this latest enhancement ...