Splunk Enterprise Security

Stats and Count log after query

tanglong
Engager

Hello,

I have problem with stats after query searching on splunk.

Please see detail on image.

  • Data Log: this is raw index in splunk.
  • Show after Query: need query for show result this table.

alt text

0 Karma
1 Solution

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

tanglong
Engager

Thanks @renjith.nair . Its working.

0 Karma

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...