<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dedup by time in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532811#M89549</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=true allow_old_summaries=true count from datamodel=Authentication.Authentication where Authentication.user=* (Authentication.src=* OR Authentication.dest=*) Authentication.action=failure by Authentication.user, Authentication.src, Authentication.dest&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This result doesn't include the time. &lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;SPAN&gt;our windows systems make about 4 events per authorization&lt;BR /&gt;&lt;/SPAN&gt;What are these?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2020 14:11:19 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-12-11T14:11:19Z</dc:date>
    <item>
      <title>dedup by time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532690#M89533</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to dedup events from successful authorizations in Splunk. Currently, our windows systems make about 4 events per authorization but we only want to see one. I would like to dedup based on time,&amp;nbsp; 0.5 seconds for each event. Here is my current search:&amp;nbsp;&lt;/P&gt;&lt;P&gt;| tstats summariesonly=true allow_old_summaries=true count from datamodel=Authentication.Authentication where Authentication.user=* (Authentication.src=* OR Authentication.dest=*) Authentication.action=failure by Authentication.user, Authentication.src, Authentication.dest&lt;/P&gt;&lt;P&gt;| rename "Authentication.*" as "*"&lt;/P&gt;&lt;P&gt;| eval source&amp;amp;destination=mvappend(src,dest)&lt;/P&gt;&lt;P&gt;| eventstats dc(source&amp;amp;destination) AS host_count by user&lt;/P&gt;&lt;P&gt;| where host_count &amp;gt;= 1&lt;/P&gt;&lt;P&gt;| sort - host_count&lt;/P&gt;&lt;P&gt;| table source&amp;amp;destination, user&lt;/P&gt;&lt;P&gt;| head 250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i add a dedup by time here?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 17:51:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532690#M89533</guid>
      <dc:creator>gba8912</dc:creator>
      <dc:date>2020-12-10T17:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: dedup by time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532811#M89549</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=true allow_old_summaries=true count from datamodel=Authentication.Authentication where Authentication.user=* (Authentication.src=* OR Authentication.dest=*) Authentication.action=failure by Authentication.user, Authentication.src, Authentication.dest&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This result doesn't include the time. &lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;SPAN&gt;our windows systems make about 4 events per authorization&lt;BR /&gt;&lt;/SPAN&gt;What are these?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 14:11:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532811#M89549</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-12-11T14:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: dedup by time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532822#M89551</link>
      <description>&lt;P&gt;An example is event 4624, when this event is triggered in our DC, it make 4 events for that single sign on by a user or system. I don't know why this is but that's how its happening. We then get 4 events in Splunk. We made a dashboard with the above search and want to filter out the duplicates in order to view only one event per successful authorization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know time is not added, but we want to add it. I was hoping to add something that dedups events say within 0.1 seconds. This way it filters out 3 out of the 4 events that happened at the exact same time. Is this possible?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 15:22:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532822#M89551</guid>
      <dc:creator>gba8912</dc:creator>
      <dc:date>2020-12-11T15:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: dedup by time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532885#M89555</link>
      <description>&lt;P&gt;I don't know, because I haven't looked at the logs.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 23:37:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/dedup-by-time/m-p/532885#M89555</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-12-11T23:37:57Z</dc:date>
    </item>
  </channel>
</rss>

