Splunk Search

Using event count with a table

thisemailwillbe
Explorer

Hi all,

Here is my current search:

source=health.log REGION=region1 STATE=down TYPE=type1

What I want to do: I want the table to only display results if the region/state/type combination has happened 5 times in the past hour.

I tried using stats count, but I couldn't get it to work and also use table to output the multiple fields.

I must be not understanding something because this seems like it should be fairly easy to do...

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
source=health.log REGION=region1 STATE=down TYPE=type1
| stats count by REGION STATE TYPE
| where count >= 5

or, if you want the events which are included in these stats

source=health.log REGION=region1 STATE=down TYPE=type1
| eventstats count by REGION STATE TYPE
| where count >= 5

thisemailwillbe
Explorer

Thanks! This was a really easy solution, I don't know why I didn't think of doing multiple fields...

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...