Splunk Search

how to stats counts if one of the field's value greater than 100 ?

corehan
Explorer

Hello,

I have ALERT field and in this field has different types ALERT values, so i want filter one of them counts if greater than 100

ALERT="LINK-3-UPDOWN" count=500
ALARM="IFNET/1/CRCERRORRISING" count =20

So I tried this but only show ALERT="LINK-3-UPDOWN" . I want see all values but "LINK-3-UPDOWN" filtered count

|stats count by DATE,Region,managed_object,ALERT |where count>100 AND ALARM="LINK-3-UPDOWN" |sort -count -ALARM

Regards,

0 Karma

PavelP
Motivator

Hello @corehan,

if I understand it correctly, the problem is that the count field from the raw event get overwritten by count field generated by stats command.

.. | rex "count=(?<count_orig>\d+)" |stats count by DATE,Region,managed_object,ALERT |where count_orig >100 AND ALARM="LINK-3-UPDOWN" |sort -count -ALARM

alternatively (not tested):

|stats count AS amount by DATE,Region,managed_object,ALERT |where count>100 AND ALARM="LINK-3-UPDOWN" |sort -amount -ALARM
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@corehan
Can you please share some sample events and expected output?

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...