Splunk Search

How to generate a stats count search on field with interchanging values?

mpatel11
Explorer

hi,

looking to do a stats count something like below.

Field1:
A,B
A
B,A
B,A,C
A,C

each row accounts for different events. now need a count on all A's, B's and C's.
so the result be something like:

Value |Count
A | 5
B | 3
C | 2

Tags (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

... | mvexpand Field1 | stats count by Field1
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

... | mvexpand Field1 | stats count by Field1
---
If this reply helps you, Karma would be appreciated.

mpatel11
Explorer

wow. it worked perfect. at first didn't work. then figured out I needed to convert my field to mv before applying any mv functions on it.

final query : ....| makemv delim="," Field1| mvexpand Field1| stats count by Field1

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...