Splunk Search

How to coalesce events with different values for status field?

x213217
Explorer

I have this search that will display the following

index=autosys source= jobName=
| where statusText="SUCCESS" OR statusText="RUNNING" OR statusText="FAILURE" OR statusText="JOBFAILURE"
| eval startTime=if(statusText=="RUNNING",timestamp,null)
| eval failureTime=if(statusText=="FAILURE",timestamp,null)
| eval successTime=if(statusText=="SUCCESS",timestamp,null)
| streamstats last(successTime) as prev_successtime,last(failureTime) as prev_failuretime,last(startTime) as prev_startTime current=f window=1
| table jobName startTime successTime failureTime
| rename startTime as "Start Time" successTime as "Success Time" failureTime as "Failure Time"

alt text

I would like to have the most recent startTime match up with the latest SuccessTime or FailureTime in the same row. Is this possible?

0 Karma

woodcock
Esteemed Legend

Just add this to the end:

| selfjoin jobName

You can also do this:

| stats values(*) AS * BY jobName
0 Karma

grittonc
Contributor

Does this job only run once per day?

0 Karma

x213217
Explorer

this one in particular yes, but there will be ones that run on a variety of schedules

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with William Searle

The Splunk Guy: A Developer’s Path from Web to Cloud William is a Splunk Professional Services Consultant with ...

Major Splunk Upgrade – Prepare your Environment for Splunk 10 Now!

Attention App Developers: Test Your Apps with the Splunk 10.0 Beta and Ensure Compatibility Before the ...

Stay Connected: Your Guide to June Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...