You need to tell Splunk what you want to see. To give a complete answer, we would need to see samples of your logs, but you could start with something like this:
index=foo ("Accepted" OR "Failed")
If you put that text into the search box you should get all the events that contain either "Accepted" or "Failed". Of course, you should change "foo" to the name of the index in which you store your log events. Once you see the desired events you can refine the search to extract the data you need to produce a report.
You need to tell Splunk what you want to see. To give a complete answer, we would need to see samples of your logs, but you could start with something like this:
index=foo ("Accepted" OR "Failed")
If you put that text into the search box you should get all the events that contain either "Accepted" or "Failed". Of course, you should change "foo" to the name of the index in which you store your log events. Once you see the desired events you can refine the search to extract the data you need to produce a report.
This is the solution. I never thought its that simple 😃 . Thanks for your time.
Have a great day!