Splunk Search

How to get a distinct count of only unique values of a field

summitsplunk
Communicator

So I'm trying to get a distinct count of source mac addresses by device.

The srcmac gives me the mac address
The devtype gives me the type of device like Windows, Mac, Android etc.

When I run the search below it gives a count of all events, it looks like where there's both a srcmac and a devtype.

The problem is I only want to know the count of unique values for srcmac, so only unique mac addresses in this case.
How would I go about reformatting the search below to do this?

| stats dc(srcmac) by devtype
0 Karma

MuS
Legend

Hi summitsplunk,

just try this:

 | stats dc(srcmac)

this will give you a distinct count of srcmac

Hope this helps ...

cheers, MuS

Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...