Splunk Search

How to get a distinct count of only unique values of a field

summitsplunk
Communicator

So I'm trying to get a distinct count of source mac addresses by device.

The srcmac gives me the mac address
The devtype gives me the type of device like Windows, Mac, Android etc.

When I run the search below it gives a count of all events, it looks like where there's both a srcmac and a devtype.

The problem is I only want to know the count of unique values for srcmac, so only unique mac addresses in this case.
How would I go about reformatting the search below to do this?

| stats dc(srcmac) by devtype
0 Karma

MuS
Legend

Hi summitsplunk,

just try this:

 | stats dc(srcmac)

this will give you a distinct count of srcmac

Hope this helps ...

cheers, MuS

Get Updates on the Splunk Community!

How to Get Started with Splunk Data Management Pipeline Builders (Edge Processor & ...

If you want to gain full control over your growing data volumes, check out Splunk’s Data Management pipeline ...

Out of the Box to Up And Running - Streamlined Observability for Your Cloud ...

  Tech Talk Streamlined Observability for Your Cloud Environment Register    Out of the Box to Up And Running ...

Splunk Smartness with Brandon Sternfield | Episode 3

Hello and welcome to another episode of "Splunk Smartness," the interview series where we explore the power of ...