Splunk Search

Group events into a single event

schou87
Path Finder

I am relatively new to this wonderful tool called SPLUNK. Please excuse me if this question has already been answered.

I have event logs from an SFTP . Below is the table from logs

Current_Status          Count

Delivered                       56415

Pending                          10000

Failed                               200

Error                                 300

My requirement is below :

Current_Status          Count

Delivered                       56415

Pending                          10000

Others                             500

 

Please help..

Thank you in advance.

0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

How did you generate the first table as it might be easier to go back a step?

0 Karma

schou87
Path Finder

base search | stats count by current_Status

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
base search 
| eval current_Status=if(current_Status!="Delivered" AND current_Status!="Pending","Other",current_Status)
| stats count by current_Status
0 Karma

schou87
Path Finder

Thank you !! This worked perfect 😀

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...