Splunk Search

how to do a stats count and generate all of the fields

mrtolu6
Path Finder

I'm trying to do a stats command to find a count of any value less than 2 counts and display all the other fields. I only want a stats count on one field, but I want to display all the field that is generated with that stats count result.

This is my search query
sourcetype="sourcenamet" search string | stats count by field1 | where count<2 | | table field1 field 2 field3 field4

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4

View solution in original post

0 Karma

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4
0 Karma
Get Updates on the Splunk Community!

Now Playing: Splunk Education Summer Learning Premieres

It’s premiere season, and Splunk Education is rolling out new releases you won’t want to miss. Whether you’re ...

The Visibility Gap: Hybrid Networks and IT Services

The most forward thinking enterprises among us see their network as much more than infrastructure – it's their ...

Get Operational Insights Quickly with Natural Language on the Splunk Platform

In today’s fast-paced digital world, turning data into actionable insights is essential for success. With ...