Splunk Search

Group events into a single event

schou87
Path Finder

I am relatively new to this wonderful tool called SPLUNK. Please excuse me if this question has already been answered.

I have event logs from an SFTP . Below is the table from logs

Current_Status          Count

Delivered                       56415

Pending                          10000

Failed                               200

Error                                 300

My requirement is below :

Current_Status          Count

Delivered                       56415

Pending                          10000

Others                             500

 

Please help..

Thank you in advance.

0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How did you generate the first table as it might be easier to go back a step?

0 Karma

schou87
Path Finder

base search | stats count by current_Status

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status
0 Karma

schou87
Path Finder

Thank you !! This worked perfect 😀

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...