I have input data from a software runtime log in the form:
DATE TIME, SEVERITY, ERROR MESSAGE
The "ERROR MESSAGE" field could be one of two messages:
"Could not connect to : Timed out"
"Could not connect to : No route to host"
I'd like to split the columns in the chart by colour between the two types (timed out vs no route), but because of the "server IP" being in the message, instead of two columns every hour, I get about 100, one for each server IP, since the IP address makes each message look unique.
By the way, I'm relatively new to Splunk so if there is an obvious answer or my question sounds trivial and has been answered plenty of times before, I apologize.
Is there any way to split the columns into just two, ignoring the server IP in the message - therefore just splitting based on part of the message.