Splunk Search

Require Splunk query

khursheed
New Member

Hi

Below data is dynamic, sample input table is given below, rows are order may vary (for simplicity I have put the data in order to understand easily).  

Input:

Feature Name

Browser Name

Result

Feature 1

B1

Pass

Feature 1

B1

Pass

Feature 1

B1

Pass

Feature 1

B1

Pass

Feature 1

B2

Fail

Feature 1

B2

Pass

Feature 1

B2

Pass

Feature 1

B2

Pass

Feature 1

B3

Pass

Feature 1

B3

Pass

Feature 1

B3

Pass

Feature 1

B3

Fail

Feature 1

B4

Pass

Feature 1

B4

Pass

Feature 1

B4

Fail

Feature 1

B4

Pass

 

Based on the above input table, output needs to be generated as listed below.  Cumulative result needs to be generated based on the browser name and result for each feature.  If any one of result fails on particular a browser, feature is considered failed.  

Output:

Feature 1

B1

Pass

Feature 1

B2

Fail

Feature 1

B3

Fail

Feature 1

B4

Fail

 

Would you please help me to generate expected output as listed.

Labels (3)
Tags (3)
0 Karma

somesoni2
Revered Legend

Try something like this

Your Base search fetching fields "Feature Name","Browser Name",Result
| stats count(eval(Result="Fail")) as Result by "Feature Name","Browser Name"
| eval Result=if(Result>0,"Fail","Pass")
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats values(Result) as Result by 'Browser Name' 'Feature Name'
| eval Result=mvindex(Result,0)
0 Karma
Get Updates on the Splunk Community!

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...