Splunk Search

Group events into a single event

schou87
Path Finder

I am relatively new to this wonderful tool called SPLUNK. Please excuse me if this question has already been answered.

I have event logs from an SFTP . Below is the table from logs

Current_Status          Count

Delivered                       56415

Pending                          10000

Failed                               200

Error                                 300

My requirement is below :

Current_Status          Count

Delivered                       56415

Pending                          10000

Others                             500

 

Please help..

Thank you in advance.

0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How did you generate the first table as it might be easier to go back a step?

0 Karma

schou87
Path Finder

base search | stats count by current_Status

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status
0 Karma

schou87
Path Finder

Thank you !! This worked perfect 😀

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...