Splunk Search

Dedup on multiple fields but count the instance, and display as new field.

kearnwl
Engager

Original Data

SrcIP       SrcName     DstIP       DstName         DstPort 
192.168.1.1 bob.net.net 172.16.16.1 alice.net.net   21
192.168.1.1 bob.net.net 172.16.16.1 alice.net.net   21

Data that I would like to Display

SrcIP           SrcName     DstIP       DstName     DstPort     Count
192.168.1.1     bob.net.net 172.16.16.1 alice.net.net   21      2
Tags (3)
1 Solution

Ayn
Legend
... | stats count by SrcIP SrcName DstIP DstName DstPort

View solution in original post

kearnwl
Engager

Ok... wow, that was much easier than I thought. Thanks for helping me, and making me feel more than a little silly.

0 Karma

Ayn
Legend

No problem 🙂 That's often the case with Splunk - seemingly difficult task can be solved surprisingly easy by finding the right command and arguments!

Could you please mark my answer as accepted? Thanks!

0 Karma

Ayn
Legend
... | stats count by SrcIP SrcName DstIP DstName DstPort
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...