Splunk Search

Adding fields in stats command

smanojkumar
Contributor

Hi Splunkers!
   Good day!
   I would like to add event and detection fields in stats command, after adding in stats command, I'm not getting the expected results. I need that fields as well but I should get the expected results,

Old command 
| stats count as num by name country state scope 

Modified command
| stats count as num by name country state scope event description - giving me wrong results.

Thanks in Advance!
Manoj Kumar S

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @smanojkumar,

after the BY cluse you should add only the fields to use for aggregation.

The other fields can be added to the stats command suing the values option.

So if you want to aggregate only for name and you want the other fields, you could use:

| stats 
   count AS num 
   values(country) AS country
   values(state) AS state
   values(scope) AS scope
   values(event) AS event
   values(description) AS description
   BY name 

As you can read at https://docs.splunk.com/Documentation/SCS/current/SearchReference/StatsCommandOverview

Ciao.

Giuseppe

View solution in original post

smanojkumar
Contributor

Hi @gcusello ,
   It works, Thanks for your response!

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @smanojkumar,

after the BY cluse you should add only the fields to use for aggregation.

The other fields can be added to the stats command suing the values option.

So if you want to aggregate only for name and you want the other fields, you could use:

| stats 
   count AS num 
   values(country) AS country
   values(state) AS state
   values(scope) AS scope
   values(event) AS event
   values(description) AS description
   BY name 

As you can read at https://docs.splunk.com/Documentation/SCS/current/SearchReference/StatsCommandOverview

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...