<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hide the duplicate events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45287#M10724</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have 2 sources of events with "almost" the same framework and some of them reference the same event with the same content.&lt;BR /&gt;
I want to hide in my search the events which matchs between the both sources for seeing only the single events.&lt;BR /&gt;
I don't know what kind of function i have to use to do that (dedup, correlate ????)&lt;/P&gt;

&lt;P&gt;Here is a single event from the 2 differents sources&lt;/P&gt;

&lt;P&gt;Event in source 1&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Jan  5 14:11:09 10.233.118.0 Jan  5 14:11:09 LX2AW8DSY CEF:0|Trend Micro|OfficeScan Intrusion Defense Firewall|6.1.0.69|1004371|Mozilla Firefox Obfuscated URLs Within Iframes Vulnerability|6|dmac=F0:DE:F1:18:58:49 smac=00:21:55:EF:8F:FF src=10.5.69.50 dst=10.233.118.0 in=1414 proto=TCP spt=8080 dpt=63034 cs2=0x00 ACK cnt=1 act=IDS:Log cn3=503 cs5=761296 cs1=Obfuscated_URL_i cs6=8
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Event in source 2&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1/5/2012 14:11,LX2AW8DSY,DPI Rule: 1004371 - Mozilla Firefox Obfuscated URLs Within Iframes Vulnerability,Web Client Mozilla FireFox,Detect Only: Log,25,Reverse Flow,F0:DE:F1:18:58:49,TCP,ACK,10.5.69.50,00:21:55:EF:8F:FF,8080,10.233.118.0,F0:DE:F1:18:58:49,63034,1400,"""Obfuscated URL i""",0,0,,1,
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I know i can use the date, hours, minutes and type of event to check if there's a duplicate, doing a dedup of the 2 events and hide it.&lt;/P&gt;

&lt;P&gt;How could i do that ?&lt;/P&gt;

&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Fri, 06 Jan 2012 15:02:55 GMT</pubDate>
    <dc:creator>rbw78</dc:creator>
    <dc:date>2012-01-06T15:02:55Z</dc:date>
    <item>
      <title>hide the duplicate events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45287#M10724</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have 2 sources of events with "almost" the same framework and some of them reference the same event with the same content.&lt;BR /&gt;
I want to hide in my search the events which matchs between the both sources for seeing only the single events.&lt;BR /&gt;
I don't know what kind of function i have to use to do that (dedup, correlate ????)&lt;/P&gt;

&lt;P&gt;Here is a single event from the 2 differents sources&lt;/P&gt;

&lt;P&gt;Event in source 1&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Jan  5 14:11:09 10.233.118.0 Jan  5 14:11:09 LX2AW8DSY CEF:0|Trend Micro|OfficeScan Intrusion Defense Firewall|6.1.0.69|1004371|Mozilla Firefox Obfuscated URLs Within Iframes Vulnerability|6|dmac=F0:DE:F1:18:58:49 smac=00:21:55:EF:8F:FF src=10.5.69.50 dst=10.233.118.0 in=1414 proto=TCP spt=8080 dpt=63034 cs2=0x00 ACK cnt=1 act=IDS:Log cn3=503 cs5=761296 cs1=Obfuscated_URL_i cs6=8
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Event in source 2&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1/5/2012 14:11,LX2AW8DSY,DPI Rule: 1004371 - Mozilla Firefox Obfuscated URLs Within Iframes Vulnerability,Web Client Mozilla FireFox,Detect Only: Log,25,Reverse Flow,F0:DE:F1:18:58:49,TCP,ACK,10.5.69.50,00:21:55:EF:8F:FF,8080,10.233.118.0,F0:DE:F1:18:58:49,63034,1400,"""Obfuscated URL i""",0,0,,1,
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I know i can use the date, hours, minutes and type of event to check if there's a duplicate, doing a dedup of the 2 events and hide it.&lt;/P&gt;

&lt;P&gt;How could i do that ?&lt;/P&gt;

&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2012 15:02:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45287#M10724</guid>
      <dc:creator>rbw78</dc:creator>
      <dc:date>2012-01-06T15:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: hide the duplicate events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45288#M10725</link>
      <description>&lt;P&gt;Use &lt;CODE&gt;dedup&lt;/CODE&gt; with the fields you want to dedup on as arguments. So for instance if you have a field &lt;CODE&gt;rule&lt;/CODE&gt; in both events and want to filter multiple events within the same day of the month, hour and minute, you would do:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | dedup rule date_mday date_hour date_minute
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;EDIT: Sorry, I see now that I misunderstood your question, I didn't realize you wanted to remove BOTH events. For that I would advise you to use &lt;CODE&gt;transaction&lt;/CODE&gt; in a similar way:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | transaction rule maxspan=1m | search eventcount=1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will remove all transactions which have more than one event (i.e. the ones with duplicate messages).&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2012 19:07:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45288#M10725</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-01-06T19:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: hide the duplicate events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45289#M10726</link>
      <description>&lt;P&gt;Dedup is still going to return one of the events though. If you want to return only those events that are not in both sets, you could:&lt;/P&gt;

&lt;P&gt;Perform a search taht returns both event types in the same result set. Add a field to each event that identifies what "type" or source each event comes from. Maybe &lt;CODE&gt;| eval type1=if(index=1, "TRUE", "FALSE") | eval type2=if(index=2, "TRUE", "FALSE") |&lt;/CODE&gt;. Then use the transaction command to merge similar events into a single event. Finally, add &lt;CODE&gt;| where NOT (type1=TRUE AND type2=TRUE)&lt;/CODE&gt; to the end of the search string.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:58:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/hide-the-duplicate-events/m-p/45289#M10726</guid>
      <dc:creator>rtadams89</dc:creator>
      <dc:date>2012-01-06T20:58:13Z</dc:date>
    </item>
  </channel>
</rss>

