<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to aggregate log entries in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108625#M28292</link>
    <description>&lt;P&gt;Newbie to splunk, but I want to aggregate the log entries below based upon if it's the same ip address and request url.&lt;/P&gt;

&lt;PRE&gt;
192.168.8.5     [10/Nov/2011:11:11:23] "GET /hello/world HTTP/1.1" 200 1234
192.168.8.7     [10/Nov/2011:15:46:23] "GET /foo/bar HTTP/1.1" 200 124
192.168.8.5     [10/Nov/2011:18:00:25] "GET /foo/bar HTTP/1.1" 200 124
192.168.8.10    [10/Nov/2011:23:11:23] "GET /hello/world HTTP/1.1" 200 1234
192.168.8.5     [10/Nov/2011:23:59:00] "GET /hello/world HTTP/1.1" 200 1234
&lt;/PRE&gt;

&lt;P&gt;So the outcome I would like is as follows:&lt;/P&gt;

&lt;PRE&gt;
ip address      request url                     count      
192.168.8.5     "GET /hello/world HTTP/1.1"     2 
192.168.8.7     "GET /foo/bar HTTP/1.1"         1
192.168.8.5     "GET /foo/bar HTTP/1.1"         1
192.168.8.10    "GET /hello/world HTTP/1.1"     1
&lt;/PRE&gt;

&lt;P&gt;Can someone provide some insight?  I've played around with dedup and distinct_count but can't seem to get it right to get the aggregated information from splunk.&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Fri, 11 Nov 2011 06:22:30 GMT</pubDate>
    <dc:creator>mchan</dc:creator>
    <dc:date>2011-11-11T06:22:30Z</dc:date>
    <item>
      <title>how to aggregate log entries</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108625#M28292</link>
      <description>&lt;P&gt;Newbie to splunk, but I want to aggregate the log entries below based upon if it's the same ip address and request url.&lt;/P&gt;

&lt;PRE&gt;
192.168.8.5     [10/Nov/2011:11:11:23] "GET /hello/world HTTP/1.1" 200 1234
192.168.8.7     [10/Nov/2011:15:46:23] "GET /foo/bar HTTP/1.1" 200 124
192.168.8.5     [10/Nov/2011:18:00:25] "GET /foo/bar HTTP/1.1" 200 124
192.168.8.10    [10/Nov/2011:23:11:23] "GET /hello/world HTTP/1.1" 200 1234
192.168.8.5     [10/Nov/2011:23:59:00] "GET /hello/world HTTP/1.1" 200 1234
&lt;/PRE&gt;

&lt;P&gt;So the outcome I would like is as follows:&lt;/P&gt;

&lt;PRE&gt;
ip address      request url                     count      
192.168.8.5     "GET /hello/world HTTP/1.1"     2 
192.168.8.7     "GET /foo/bar HTTP/1.1"         1
192.168.8.5     "GET /foo/bar HTTP/1.1"         1
192.168.8.10    "GET /hello/world HTTP/1.1"     1
&lt;/PRE&gt;

&lt;P&gt;Can someone provide some insight?  I've played around with dedup and distinct_count but can't seem to get it right to get the aggregated information from splunk.&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2011 06:22:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108625#M28292</guid>
      <dc:creator>mchan</dc:creator>
      <dc:date>2011-11-11T06:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to aggregate log entries</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108626#M28293</link>
      <description>&lt;P&gt;just search ... | stats count by ip_address,request_url can do for this   &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:05:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108626#M28293</guid>
      <dc:creator>hjwang</dc:creator>
      <dc:date>2020-09-28T10:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to aggregate log entries</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108627#M28294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Given that you have extracted the fields as &lt;CODE&gt;clientip&lt;/CODE&gt; and &lt;CODE&gt;url&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;   &amp;lt;your base search here&amp;gt; | stats count by clientip url
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;should produce the desired results.&lt;/P&gt;

&lt;P&gt;hope this helps,&lt;/P&gt;

&lt;P&gt;/Kristian&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2011 07:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-aggregate-log-entries/m-p/108627#M28294</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2011-11-11T07:21:13Z</dc:date>
    </item>
  </channel>
</rss>

