Splunk Search

How to generate a search that will count the use of operating systems in our organization?

GenericSplunkUs
Path Finder

I'm trying to craft a search to count the use of operating systems in our organization. I don't want the duplicates.
The search I have right now isn't getting me the desired results.

index="LOGSIWANT" | stats count by OSVERSION | sort - count

This counts how many times the OS is in the logs, but doesn't account for 1 count per Host, It just counts it all.

I want to do this without counting everything. Host is the field that contains the computers name so how would I use this to parse my data down to 1 occurrence per host for a true count of what OS is most popular in our organization?

I've got several other searches that need this logic, but This example should be enough.

I'm headed out for the day and will answer this in the morning.

Thanks much ahead of time for the help Splunk Ninja Masters!

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

How about this?

index="LOGSIWANT" | dedup host | stats count by OSVERSION | sort - count
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

How about this?

index="LOGSIWANT" | dedup host | stats count by OSVERSION | sort - count
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...