Splunk Search

How to edit my search to filter only IPs that have multiple Attack Names associated with them?

alexburst37
Explorer

How do I filter only IPs that have multiple Attack Names associated with them? Here is the search string so far; however, we are unable to filter out the values of 1:

sourcetype="mcafee:ids" | stats dc(Attack_Name) by SIP

How do I return results by SIP where Attack_Names are greater than 1?

0 Karma
1 Solution

HiroshiSatoh
Champion

Is this?

sourcetype="mcafee:ids" | stats dc(Attack_Name) as count by SIP| search count>1

View solution in original post

0 Karma

HiroshiSatoh
Champion

Is this?

sourcetype="mcafee:ids" | stats dc(Attack_Name) as count by SIP| search count>1

0 Karma

alexburst37
Explorer

Yes it worked. Thank you

0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...