Splunk Search

Count all events matching field value?

sjs
Path Finder

My data looks something like this

sjs_0-1673402480170.png

The status can be either SUCCESS or FAILED, I want to count the total number of events that has status as FAILED and status as SUCCESS.

 

FYI: The status is not a direct field, I had to extract it out by using 

| rex "status=(?<Status>[^,]+)"

 

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust
your search and your rex...
| stats count by status

View solution in original post

sjs
Path Finder

Thanks it helped 🥳🥳🥳

0 Karma

bowesmana
SplunkTrust
SplunkTrust
your search and your rex...
| stats count by status
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...