Splunk Search

Filter count?

clintla
Contributor

Trying to output just names where the count=1.

Original Search

Aliases="*hba*" | rex "Aliases:\s+(?<Aliname>\S+)_hba" | chart values(Permanent_Port_Name) by Aliname 

Tried variations of the below- most complain that the count function is not supported.
I've checked the documentation & havent found much on how to do this.

Aliases="*hba*" | rex "Aliases:\s+(?<Aliname>\S+)_hba" | where count(Aliname)=1 | chart values(Permanent_Port_Name) by Aliname 
Aliases="*hba*" | rex "Aliases:\s+(?<Aliname>\S+)_hba" | search count(Aliname)=1 | chart values(Permanent_Port_Name) by Aliname 
Aliases="*hba*" | rex "Aliases:\s+(?<Aliname>\S+)_hba" | eval FAIL=count(Aliname) | where FAIL=1 | chart values(Permanent_Port_Name) by Aliname 

Only want to chart where my count=1

Tags (3)
0 Karma
1 Solution

lguinn2
Legend
Aliases="*hba*" 
| rex "Aliases:\s+(?<Aliname>\S+)_hba"
| chart distinct_count(Permanent_Port_Name) as PortNameCount values(Permanent_Port_Name) by Aliname 
| where PortNameCount = 1

This will work, and I think it is what you want. Maybe.

There were several problems with your earlier attempts. First, the where command does not have a count function. Second, the values function returns a list of the values, not a count. The eval command does not have a count function either.

A count can be computed using the stats, chart or timechart commands. However, the count is the number of events - not the number of unique values. The distinct_count function returns the number of unique values of a field. However, you must give the field a name, by using the as clause, if you want to refer to the field in subsequent commands.

View solution in original post

0 Karma

lguinn2
Legend
Aliases="*hba*" 
| rex "Aliases:\s+(?<Aliname>\S+)_hba"
| chart distinct_count(Permanent_Port_Name) as PortNameCount values(Permanent_Port_Name) by Aliname 
| where PortNameCount = 1

This will work, and I think it is what you want. Maybe.

There were several problems with your earlier attempts. First, the where command does not have a count function. Second, the values function returns a list of the values, not a count. The eval command does not have a count function either.

A count can be computed using the stats, chart or timechart commands. However, the count is the number of events - not the number of unique values. The distinct_count function returns the number of unique values of a field. However, you must give the field a name, by using the as clause, if you want to refer to the field in subsequent commands.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...