Splunk Search

Total event count of specific field

hagjos43
Contributor

My Query:

index=blah sourcetype="blah-2" | dedup User_IP

This works by extracting the unique IP's defined by the field User_IP, and the eventcount at the top of the search returns a total of say "395". What I want it to do is actually spit out the number within the search results so I can add this to a dashboard.

I can't for the life of me find the correct command to do so.

Thanks in advance!

Tags (2)
0 Karma

Ayn
Legend
... | stats count

?

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...