Splunk Search

How to get Success, In Progress and Failure Count from this data

agar1122
New Member

I have this kind of data,

 

Event IDEvent StepStatus 
1001SUCCESS 
1002SUCCESS 
1003FAILURE 
1004FAILURE 
1005SUCCESS 
1006FAILURE 

 

Success Condition : When Event Steps 1,2,4 and 5 ALL are SUCCESS , then SUCESS, Else it is in PROGRESS.

Can you help me with the query to find out the same.

I have tried AND Condition, but it is not giving me correct result, because it searches for one condition only.

I have tried OR as well, but that gives me wrong count.

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You need to evaluate the status of each step and recombine them into a single row per event (stats), then evaluate your success condition

...
| eval status1=if(step=1,status,null)
| eval status2=if(step=2,status,null)
| eval status3=if(step=3,status,null)
| eval status4=if(step=4,status,null)
| eval status5=if(step=5,status,null)
| eval status6=if(step=6,status,null)
| stats values(status1) as status1, values(status2) as status2, values(status3) as status3, values(status4) as status4, values(status5) as status5, values(status6) as status6 by event
| eval overall=if(status1="SUCCESS" AND status2="SUCCESS" AND status4="SUCCESS" AND status5="SUCCESS", "SUCCESS", "IN PROGRESS")
| table event, overall

 

Get Updates on the Splunk Community!

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...