Why did you not include all of that in the OP? You could have had a solution many hours sooner.
index=myindex earliest=-24h
``` Count each hash value ```
| eventstats count by SHA256HashData
``` Find the hash value with the lowest count ```
| eventstats min(count) as minCount
``` Keep the hashes with the lowest count ```
| where count=minCount
| collect index=summary
when I run your search I got too many results ,
with rare I got only 10 results.
there is no options to use rare and add more fields to the table?
Use the head command to limit the number of results. The rare does not do what you want it to do because it discards fields and once fields are discarded they cannot be retrieved again.
index=myindex earliest=-24h
``` Count each hash value ```
| eventstats count by SHA256HashData
``` Find the hash value with the lowest count ```
| eventstats min(count) as minCount
``` Keep the hashes with the lowest count ```
| where count=minCount
| head 10
| collect index=summary
but I want to get the most unique SHA256HashData in the last 24h for example. and then fwd to summary index and start static about it, so for that I need to get more data
Both stats and rare are transforming commands, meaning only the fields used in or produced by the commands are available to later commands. So the only fields available after stats are count and SHA256HashData; and the only fields available after rare are SHA256HashData, count, and percent.
To get additional fields out of stats, include them in the command. To work around rare, use sort and tail.
index=myindex
| stats count, max(_time) as _time by SHA256HashData
| sort - SHA256HashData
| tail 10