Splunk Enterprise Security

Stats and Count log after query

tanglong
Engager

Hello,

I have problem with stats after query searching on splunk.

Please see detail on image.

  • Data Log: this is raw index in splunk.
  • Show after Query: need query for show result this table.

alt text

0 Karma
1 Solution

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

tanglong
Engager

Thanks @renjith.nair . Its working.

0 Karma

renjith_nair
Legend

@tanglong,

Try

"your base search"|stats dc(src_ip) as count,values(src_ip) as src_ip by user|sort -count
---
What goes around comes around. If it helps, hit it with Karma 🙂
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...