Splunk Search

How can I create a table of my search results with a count of each matching dest_ip value?

Path Finder

I have this search of events:

eventtype=cisco-firewall src_ip="*" (dest_ip="" OR dest_ip="" OR dest_ip="" ) 

For each src_ip, I'd like to list the dest_ip and the count of src_ip so it'd like look

src_ip          | dest_ip                | count |, | 123 |, | 55    |            | 894    |,, | 235
0 Karma


your search
| stats count by src_ip dest_ip
| stats list(dest_ip), list(count) by src_ip

0 Karma
Get Updates on the Splunk Community!

Improve Your Security Posture

Watch NowImprove Your Security PostureCustomers are at the center of everything we do at Splunk and security ...

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...