Splunk Search

how to do a stats count and generate all of the fields

mrtolu6
Path Finder

I'm trying to do a stats command to find a count of any value less than 2 counts and display all the other fields. I only want a stats count on one field, but I want to display all the field that is generated with that stats count result.

This is my search query
sourcetype="sourcenamet" search string | stats count by field1 | where count<2 | | table field1 field 2 field3 field4

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4

View solution in original post

0 Karma

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4
0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...