Splunk Search

How would I count by a most recent event value?

splunkingjh
Engager

The value that I need to count can be in multiple events. I just want to count it one time, but it will need to be the most recent value counted.

0 Karma

sundareshr
Legend

Try this, assuming the values are extracted in a field called yourField

index=foo sourcetype=bar | stats dc(yourField) as yourField by facility

*OR*

index=foo sourcetype=bar | timechart span=1h latest(yourField) as yourField by facility

somesoni2
Revered Legend

Without much information, I would suggest to give these a try

index=foo sourcetype=bar yourfield=yourvalue | head 1 | table yourfield

index=foo sourcetype=bar | stats latest(yourfield) as yourfield

splunkingjh
Engager

The second option seems to pull back the most recent. Is there a way that I can count all of those values? I am trying to parse HL7 data. It has presented quite the challenge. I am trying to provide a visual that will show active counts across the facility of different events.

0 Karma

somesoni2
Revered Legend

By "Is there a way that I can count all of those values", Do you mean that you want to count the event which has the same value for field yourfield as in the latest event? If yes, then try something like this (if no, provide more info)

index=foo sourcetype=bar [ search index=foo sourcetype=bar | stats latest(yourfield) as yourfield] | stats count by yourfield
0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...