Splunk Search

How to get a distinct count of only unique values of a field

summitsplunk
Communicator

So I'm trying to get a distinct count of source mac addresses by device.

The srcmac gives me the mac address
The devtype gives me the type of device like Windows, Mac, Android etc.

When I run the search below it gives a count of all events, it looks like where there's both a srcmac and a devtype.

The problem is I only want to know the count of unique values for srcmac, so only unique mac addresses in this case.
How would I go about reformatting the search below to do this?

| stats dc(srcmac) by devtype
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi summitsplunk,

just try this:

 | stats dc(srcmac)

this will give you a distinct count of srcmac

Hope this helps ...

cheers, MuS

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...