Splunk Search

how to do a stats count and generate all of the fields

mrtolu6
Path Finder

I'm trying to do a stats command to find a count of any value less than 2 counts and display all the other fields. I only want a stats count on one field, but I want to display all the field that is generated with that stats count result.

This is my search query
sourcetype="sourcenamet" search string | stats count by field1 | where count<2 | | table field1 field 2 field3 field4

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4

View solution in original post

0 Karma

woodcock
Esteemed Legend

Switch to eventstats:

sourcetype="sourcenamet" search string | eventstats count by field1 | where count<2 | table field1 field 2 field3 field4
0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...