Splunk Enterprise Security

Stats and Count log after query

tanglong
Engager

Hello,

I have problem with stats after query searching on splunk.

Please see detail on image.

  • Data Log: this is raw index in splunk.
  • Show after Query: need query for show result this table.

alt text

0 Karma
1 Solution

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

tanglong
Engager

Thanks @renjith.nair . Its working.

0 Karma

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...