Splunk Search

Group events into a single event

schou87
Path Finder

I am relatively new to this wonderful tool called SPLUNK. Please excuse me if this question has already been answered.

I have event logs from an SFTP . Below is the table from logs

Current_Status          Count

Delivered                       56415

Pending                          10000

Failed                               200

Error                                 300

My requirement is below :

Current_Status          Count

Delivered                       56415

Pending                          10000

Others                             500

 

Please help..

Thank you in advance.

0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How did you generate the first table as it might be easier to go back a step?

0 Karma

schou87
Path Finder

base search | stats count by current_Status

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status
0 Karma

schou87
Path Finder

Thank you !! This worked perfect 😀

0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...