Splunk Search

rare command

Shakira1
Explorer

hello!

I have this search, and I want to add more parameters like time etc.

the thing is - when I'm using rare its show only the SHA256HashData and count

```index=myindex
| stats count by SHA256HashData
| rare SHA256HashData

any idea?

thanks! 

Labels (1)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Why did you not include all of that in the OP?  You could have had a solution many hours sooner.

index=myindex earliest=-24h
``` Count each hash value ```
| eventstats count by SHA256HashData
``` Find the hash value with the lowest count ```
| eventstats min(count) as minCount
``` Keep the hashes with the lowest count ```
| where count=minCount
| collect index=summary
---
If this reply helps you, Karma would be appreciated.
0 Karma

Shakira1
Explorer

when I run your search I got too many results ,

with rare I got only 10 results.

there is no options to use rare and add more fields to the table?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Use the head command to limit the number of results.  The rare does not do what you want it to do because it discards fields and once fields are discarded they cannot be retrieved again.

index=myindex earliest=-24h
``` Count each hash value ```
| eventstats count by SHA256HashData
``` Find the hash value with the lowest count ```
| eventstats min(count) as minCount
``` Keep the hashes with the lowest count ```
| where count=minCount
| head 10
| collect index=summary
---
If this reply helps you, Karma would be appreciated.
0 Karma

Shakira1
Explorer

but I want to get the most unique SHA256HashData in the last 24h for example. and then fwd to summary index and start static about it, so for that I need to get more data

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Both stats and rare are transforming commands, meaning only the fields used in or produced by the commands are available to later commands.  So the only fields available after stats are count and SHA256HashData; and the only fields available after rare are SHA256HashData, count, and percent.

To get additional fields out of stats, include them in the command.  To work around rare, use sort and tail.

index=myindex
| stats count, max(_time) as _time by SHA256HashData
| sort - SHA256HashData
| tail 10

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...