Splunk Search

Using event count with a table

thisemailwillbe
Explorer

Hi all,

Here is my current search:

source=health.log REGION=region1 STATE=down TYPE=type1

What I want to do: I want the table to only display results if the region/state/type combination has happened 5 times in the past hour.

I tried using stats count, but I couldn't get it to work and also use table to output the multiple fields.

I must be not understanding something because this seems like it should be fairly easy to do...

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

thisemailwillbe
Explorer

Thanks! This was a really easy solution, I don't know why I didn't think of doing multiple fields...

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...