Splunk Search

how to do a stats count and generate all of the fields

mrtolu6
Path Finder

I'm trying to do a stats command to find a count of any value less than 2 counts and display all the other fields. I only want a stats count on one field, but I want to display all the field that is generated with that stats count result.

This is my search query
sourcetype="sourcenamet" search string | stats count by field1 | where count<2 | | table field1 field 2 field3 field4

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4

View solution in original post

0 Karma

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4
0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Brett Adams

In our third Spotlight feature, we're excited to shine a light on Brett—a Splunk consultant, innovative ...

Index This | What can you do to make 55,555 equal 500?

April 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...