Splunk Search

Using event count with a table

thisemailwillbe
Explorer

Hi all,

Here is my current search:

source=health.log REGION=region1 STATE=down TYPE=type1

What I want to do: I want the table to only display results if the region/state/type combination has happened 5 times in the past hour.

I tried using stats count, but I couldn't get it to work and also use table to output the multiple fields.

I must be not understanding something because this seems like it should be fairly easy to do...

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

thisemailwillbe
Explorer

Thanks! This was a really easy solution, I don't know why I didn't think of doing multiple fields...

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...