Splunk Search

stats values

vumanhtai
Path Finder

Hi Splunk Team!
i have a query: index=mail sourcetype=webmail | stats values(time) as time values(severity) as severity values(email) as email values(status) by session_ID
Results as shown in a picture
i want to show result of values (severity) greater than 2 values?
how can i do it?
Thanks!

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @vumanhtai,
let me understand, do you want to have session_IDs where:

  • there's a severity value greater than 2,
  • there are more than 2 different severity values?

In the first case, try this:

index=mail sourcetype=webmail 
| stats values(time) as time maxs(severity) as severity values(email) as email values(status) by session_ID
| where severity>2

In the second case, try this:

index=mail sourcetype=webmail 
| stats values(time) as time values(severity) as severity dc(severity) as dc_severity values(email) as email values(status) by session_ID
| where dc_severity>2

Ciao.
Giuseppe

0 Karma

vumanhtai
Path Finder

thank you
kamlesh_vaghela's answer helped me solve this problem

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@vumanhtai

Are you looking for this?

YOUR_SEARCH | where mvcount(severity) > 2
0 Karma

vumanhtai
Path Finder

Thank you so much!

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@vumanhtai

Glad to help you. Please accept this answer to close this question.

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...