- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Creating subtotal counts of data from fields in the data using Splunk Enterprise
Thanks in advance for the assistance, I am very new to Splunk it is a great tool but I need some assistance.
I am trying to create a filtered report with the following criteria.
- I am filtering the data down based on phishing, and now I need to grab each of the individual src_ip and count them. over a 30 day period. Unfortunately I do not know have a prelist of IP addresses based on all of the examples. My goal is to go down the list and count the number of occurrences in this list and show the report on a front panel.
Also, any good books or video training for learning how to do advanced filtering in Splunk.
Thanks
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Hi @kentagous,
you can find many interesting videos in the YouTube Splunk Channel (https://www.youtube.com/@Splunkofficial).
then you can find many free courses at https://www.splunk.com/en_us/training/free-courses/overview.html
At least I hint to follow the Splunk Search Tutorial that helps you to understand how to create a search (https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/WelcometotheSearchTutorial).
About your request, it depends on the data you have (fields).
So if you have the src_ip field in your index, you could run something like this:
index=your_index sourcetype=your_sourcetype earliest=-30d@d latest=now
| stats count BY src_ip
Ciao.
Giuseppe
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Assuming you already have the src_ip field already extracted correctly, you could try something like this
| stats count by src_ip
