Splunk Search

Search query - where after stats count command

shayhibah
Path Finder

I'm trying to count the value of "name" field and to show results only where the count is greater than 1.

My query is: | stats count by name| where count > 1

What am I missing? 😮

Thanks

Tags (1)

martin_mueller
SplunkTrust
SplunkTrust

The search looks correct if you want "count events for each value of the name field, and only show name field values that occur more than once".

If that's not what you're looking for, do elaborate more what your actual use case is.

martin_mueller
SplunkTrust
SplunkTrust

Got a screenshot that includes your search and results with count=1?

0 Karma

shayhibah
Path Finder

Thats exatcly what I want.
The problem is that I can find events on the results that their count equals to 1.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...