Splunk Search

Sort search results based on other log values

DFresh4130
Path Finder

So I'm currently searching my jboss access logs for all 500 errors with " 500 ". I get all the results, but then I'd like to sort by how many there are for each URI returned. An example would be how do I get the search to break out the results by how many 500s there are for /ABC, how many for /123 and how many for /test. Thanks

Tags (1)
0 Karma
1 Solution

MarioM
Motivator

you can use :

<your search> | top uri

<your search> | stats count by uri

you can add to this the following to sort the uri by order :

| sort - uri

View solution in original post

MarioM
Motivator

you can use :

<your search> | top uri

<your search> | stats count by uri

you can add to this the following to sort the uri by order :

| sort - uri
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...