Splunk Search

how to stats counts if one of the field's value greater than 100 ?

corehan
Explorer

Hello,

I have ALERT field and in this field has different types ALERT values, so i want filter one of them counts if greater than 100

ALERT="LINK-3-UPDOWN" count=500
ALARM="IFNET/1/CRCERRORRISING" count =20

So I tried this but only show ALERT="LINK-3-UPDOWN" . I want see all values but "LINK-3-UPDOWN" filtered count

|stats count by DATE,Region,managed_object,ALERT |where count>100 AND ALARM="LINK-3-UPDOWN" |sort -count -ALARM

Regards,

0 Karma

PavelP
Motivator

Hello @corehan,

if I understand it correctly, the problem is that the count field from the raw event get overwritten by count field generated by stats command.

.. | rex "count=(?<count_orig>\d+)" |stats count by DATE,Region,managed_object,ALERT |where count_orig >100 AND ALARM="LINK-3-UPDOWN" |sort -count -ALARM

alternatively (not tested):

|stats count AS amount by DATE,Region,managed_object,ALERT |where count>100 AND ALARM="LINK-3-UPDOWN" |sort -amount -ALARM
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@corehan
Can you please share some sample events and expected output?

0 Karma
Get Updates on the Splunk Community!

Exporting Splunk Apps

Join us on Monday, October 21 at 11 am PT | 2 pm ET!With the app export functionality, app developers and ...

Cisco Use Cases, ITSI Best Practices, and More New Articles from Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Build Your First SPL2 App!

Watch the recording now!.Do you want to SPL™, too? SPL2, Splunk's next-generation data search and preparation ...