Splunk Search

How to generate a stats count search on field with interchanging values?

mpatel11
Explorer

hi,

looking to do a stats count something like below.

Field1:
A,B
A
B,A
B,A,C
A,C

each row accounts for different events. now need a count on all A's, B's and C's.
so the result be something like:

Value |Count
A | 5
B | 3
C | 2

Tags (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

... | mvexpand Field1 | stats count by Field1
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

... | mvexpand Field1 | stats count by Field1
---
If this reply helps you, Karma would be appreciated.

mpatel11
Explorer

wow. it worked perfect. at first didn't work. then figured out I needed to convert my field to mv before applying any mv functions on it.

final query : ....| makemv delim="," Field1| mvexpand Field1| stats count by Field1

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...