Splunk Search

How to combine like events based off hostname?

atebysandwich
Path Finder

I have events that where hostnames  show up more than once and I would like to combine them. The fields available are DNS Host_Auth IP. There will be vents where the =DNS is the same but the Host_Auth will be null and the IPs will be different. How can I combine by DNS to show the Host_Auth value that is not null and shows by IPs of the combined DNS? 

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It's not clear what the desired results are, but perhaps you could use the stats command to collect events by common DNS values.

| stats values(*) as * by DNS

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...