Splunk Search

Search query - where after stats count command

shayhibah
Path Finder

I'm trying to count the value of "name" field and to show results only where the count is greater than 1.

My query is: | stats count by name| where count > 1

What am I missing? 😮

Thanks

Tags (1)

martin_mueller
SplunkTrust
SplunkTrust

The search looks correct if you want "count events for each value of the name field, and only show name field values that occur more than once".

If that's not what you're looking for, do elaborate more what your actual use case is.

martin_mueller
SplunkTrust
SplunkTrust

Got a screenshot that includes your search and results with count=1?

0 Karma

shayhibah
Path Finder

Thats exatcly what I want.
The problem is that I can find events on the results that their count equals to 1.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Unmerging HTML Tables

[Puzzles] Solve, Learn, Repeat: Unmerging HTML TablesFor a previous puzzle, I needed some sample data, and ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...