<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: group ip by count in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53654#M13044</link>
    <description>&lt;P&gt;well I did it through CLI: # ./splunk search "host=\"20.20.20.5\" denied" | awk '{ print $14 }' | sort | uniq -c , but how to do it through webinterface?&lt;/P&gt;</description>
    <pubDate>Thu, 06 Sep 2012 21:00:04 GMT</pubDate>
    <dc:creator>janfabo</dc:creator>
    <dc:date>2012-09-06T21:00:04Z</dc:date>
    <item>
      <title>group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53653#M13043</link>
      <description>&lt;P&gt;Hello, I'm trying to write search, that will show me denied ip's sorted by it's count, like this:&lt;BR /&gt;
host="1.1.1.1" denied | stats sum(count) as count by src_ip | graph, but this only shows me number of matching events and no stats. I'd like to visualize result in form of either table or chart. Could you please advise me how to do that? Thanx in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2012 20:45:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53653#M13043</guid>
      <dc:creator>janfabo</dc:creator>
      <dc:date>2012-09-06T20:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53654#M13044</link>
      <description>&lt;P&gt;well I did it through CLI: # ./splunk search "host=\"20.20.20.5\" denied" | awk '{ print $14 }' | sort | uniq -c , but how to do it through webinterface?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2012 21:00:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53654#M13044</guid>
      <dc:creator>janfabo</dc:creator>
      <dc:date>2012-09-06T21:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53655#M13045</link>
      <description>&lt;P&gt;Something like this :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;host="20.20.20.5" denied | chart count by src_ip 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2012 21:59:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53655#M13045</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2012-09-06T21:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53656#M13046</link>
      <description>&lt;P&gt;well, this shows 0 results even if there are 10 matching events (1). See the picture &lt;A href="http://imm.io/DtsJ"&gt;here&lt;/A&gt;. When I click 2 at the picture there is 10 log records. Maybe I have something misconfigured...&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2012 06:24:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53656#M13046</guid>
      <dc:creator>janfabo</dc:creator>
      <dc:date>2012-09-07T06:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53657#M13047</link>
      <description>&lt;P&gt;Can you post a sample of the data?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2012 06:34:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53657#M13047</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2012-09-07T06:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53658#M13048</link>
      <description>&lt;P&gt;First of all, &lt;CODE&gt;src_ip&lt;/CODE&gt; must actually be a field that exists in the data and is extracted by Splunk.&lt;/P&gt;

&lt;P&gt;If it is, then&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... "denied" | top src_ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... "denied" | stats count by src_ip | sort - count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 07 Sep 2012 06:46:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53658#M13048</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2012-09-07T06:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: group ip by count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53659#M13049</link>
      <description>&lt;P&gt;Great, it works! The field didn't exists, after adding extraction rule everything works. thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Sep 2012 05:52:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/group-ip-by-count/m-p/53659#M13049</guid>
      <dc:creator>janfabo</dc:creator>
      <dc:date>2012-09-08T05:52:17Z</dc:date>
    </item>
  </channel>
</rss>

