Splunk Enterprise Security

Stats and Count log after query

tanglong
Engager

Hello,

I have problem with stats after query searching on splunk.

Please see detail on image.

  • Data Log: this is raw index in splunk.
  • Show after Query: need query for show result this table.

alt text

0 Karma
1 Solution

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

tanglong
Engager

Thanks @renjith.nair . Its working.

0 Karma

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...