<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: using dedup with multiple attributes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/531283#M150079</link>
    <description>&lt;P&gt;The Command&amp;nbsp;&lt;/P&gt;&lt;P&gt;dedup field1,field2&lt;/P&gt;&lt;P&gt;works okay if you have fields in fields one that are similar and fields in fields 3 which are also similar&lt;/P&gt;</description>
    <pubDate>Mon, 30 Nov 2020 07:40:14 GMT</pubDate>
    <dc:creator>waruike</dc:creator>
    <dc:date>2020-11-30T07:40:14Z</dc:date>
    <item>
      <title>using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85039#M21678</link>
      <description>&lt;P&gt;is it possible to use dedup to more than 1 attribute,, &lt;/P&gt;

&lt;P&gt;this is my search &lt;BR /&gt;
| dedup Object_Name &lt;/P&gt;

&lt;P&gt;i want to add another argument like this &lt;BR /&gt;
| dedup (Object_Name AND time)&lt;/P&gt;

&lt;P&gt;if it is possible please provide me with the syntax &lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 06:38:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85039#M21678</guid>
      <dc:creator>isesiem</dc:creator>
      <dc:date>2013-10-07T06:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85040#M21679</link>
      <description>&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Dedup"&gt;http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Dedup&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Yes, adding more fields as arguments to &lt;CODE&gt;dedup&lt;/CODE&gt; will filter events to only show unique &lt;EM&gt;combinations&lt;/EM&gt; of field values. E.g. if you have a log that contains logins from your users (userA and userB), with possible outcomes of 'failed' and 'success';&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=mylogin | dedup user, status | table user, status

user    status
userA   success
userB   failed
userB   success
userA   failed
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Adding a time element to the &lt;CODE&gt;dedup&lt;/CODE&gt; may produce more events than you want, since time will likely differ over time, so-to-speak. Thus you might want to use the built-in fields like &lt;CODE&gt;date_hour&lt;/CODE&gt; etc, or make use of the &lt;CODE&gt;bucket&lt;/CODE&gt; command before the &lt;CODE&gt;dedup&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Hope this helps,&lt;/P&gt;

&lt;P&gt;Kristian&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 06:52:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85040#M21679</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-07T06:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85041#M21680</link>
      <description>&lt;P&gt;i am searching for file opened this is my search &lt;/P&gt;

&lt;P&gt;EventCode=4656 Object_Type=File | dedup Object_Name&lt;/P&gt;

&lt;P&gt;it works excellent but there is a problem that when i open the file more than onece in the last week it will only show me 1 event ,, &lt;/P&gt;

&lt;P&gt;that's why i want to add the time with the object name ,, but like you said it gave me more result than i want,,&lt;/P&gt;

&lt;P&gt;so what is the solution&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:54:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85041#M21680</guid>
      <dc:creator>isesiem</dc:creator>
      <dc:date>2020-09-28T14:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85042#M21681</link>
      <description>&lt;P&gt;The solution? It depends on what you want to show. Perhaps you want to look into &lt;CODE&gt;stats&lt;/CODE&gt; or &lt;CODE&gt;timechart&lt;/CODE&gt;, e.g.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;...| stats values(Object_Name) by UserID, date_mday&lt;/CODE&gt;&lt;BR /&gt;
or&lt;BR /&gt;
&lt;CODE&gt;...| timechart span=1h list(Object_Name) by UserID&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The possibilities are endless. Please provide a more detailed description of your desired output.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 08:25:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85042#M21681</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-07T08:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85043#M21682</link>
      <description>&lt;P&gt;i want to monitor all the files in ( Shared Folder ) to see who deleted , updated  , tried to access and opened any file &lt;/P&gt;

&lt;P&gt;i succeeded in all of the above except the file open event&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;when someone opens a file i get multiple events even though all i want is 1 event  saying that a person opened a file and the file name is C://..&lt;/P&gt;

&lt;P&gt;using dedup by object name solved the problem and got only 1 event per file open,, but introduced another problem that if a user opened a file multiple time it will only count as 1 time ,,, that's why i want to add the time event to the dedup condition&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 09:43:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85043#M21682</guid>
      <dc:creator>isesiem</dc:creator>
      <dc:date>2013-10-07T09:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85044#M21683</link>
      <description>&lt;P&gt;then perhaps something like the following;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;your base search | eval access_time = strftime(_time, "%F %T")| chart list(access_time) over Object_Name by UserID&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;no dedup in this case.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 10:32:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85044#M21683</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-07T10:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85045#M21684</link>
      <description>&lt;P&gt;nope doesn't work..&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 21:55:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/85045#M21684</guid>
      <dc:creator>mendesjo</dc:creator>
      <dc:date>2016-05-18T21:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: using dedup with multiple attributes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/531283#M150079</link>
      <description>&lt;P&gt;The Command&amp;nbsp;&lt;/P&gt;&lt;P&gt;dedup field1,field2&lt;/P&gt;&lt;P&gt;works okay if you have fields in fields one that are similar and fields in fields 3 which are also similar&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 07:40:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/using-dedup-with-multiple-attributes/m-p/531283#M150079</guid>
      <dc:creator>waruike</dc:creator>
      <dc:date>2020-11-30T07:40:14Z</dc:date>
    </item>
  </channel>
</rss>

