I'm finding some splunk commands can detecting unusual event.
For example, each event has username field, usually usernames are same or similar, but sometimes there are some unusual username. So, I want to detect the unusual usernames by splunk command.
I've tried anomalies command, but didn't work as I expected.
Is there any command can reach this goad?
EX)
username
ted000
ted000
ted001
ted002
wan
In this case, I want to detect username wan.
thank you!