Splunk Search

How to edit my search to display a list of values in a single field?

Phoenie1
Engager

I've been looking through here for some time without success. My situation is this. I'm trying to parse regular Apache logs, specifically using the "user" field (the login of the person extracting the data), the "Source" (we use Apache virtual servers, so we have multiple sources of data depending on which URL you use to get in, and the Source elements are the various log files for the virtual hosts), and the "File" field, which file they have extracted with their request. Every line of the original log has one entry for each of source, user, and file.

What I want to get out of Splunk is a chart ordered by Source, showing a list of each external login accessing that source and a count of how many times over the selected time range; plus a field with a list of all of the discrete files they pulled. I don't care about counting the individual files, I just want to know what they were; just a list ideally in one "cell" of data. What I came up with and is failing spectacularly is this:

status=200 host="apachea.int.us.com" | stats count by source, user | sort -source | stats values(file) by source,user |  table source user count file

Any help would be hugely appreciated, I am a newbie.

Tags (4)
0 Karma
1 Solution

somesoni2
Revered Legend

Try something like this

"status=200 host="apachea.int.us.com"  | stats count as accesscount values(file) as FilesPulled by source, user | sort 0 - source

View solution in original post

somesoni2
Revered Legend

Try something like this

"status=200 host="apachea.int.us.com"  | stats count as accesscount values(file) as FilesPulled by source, user | sort 0 - source

Phoenie1
Engager

Thank you - that was humiliatingly simple.

somesoni2
Revered Legend

Happy that it servers your purpose. Feed free to accept the answer if there are no followup questions.

0 Karma
Get Updates on the Splunk Community!

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...