<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hunting for duplicate event data to find suspicious activities in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Hunting-for-duplicate-event-data-to-find-suspicious-activities/m-p/472321#M192296</link>
    <description>&lt;P&gt;I am trying to determine the right SPL to dig through a financial data set and look for duplicate entries. The data generally is unique but occasionally a vendor may submit a duplicate request resulting in bad things. &lt;/P&gt;

&lt;P&gt;Test data:&lt;BR /&gt;
id=11111,vendor=blah,name=tacoco,value=201,date="1/1/18"&lt;BR /&gt;
id=11112,vendor=abc,name=jump,value=321,date="2/1/18"&lt;BR /&gt;
id=11113,vendor=sneeze,name=china,value=421,date="3/1/18"&lt;BR /&gt;
id=11114,vendor=alpha,name=pooch,value=521,date="4/1/18"&lt;BR /&gt;
id=11115,vendor=splunk,name=tacos,value=221,date="5/1/18"&lt;BR /&gt;
id=11116,vendor=internet,name=golf,value=621,date="6/1/18"&lt;BR /&gt;
id=11117,vendor=office,name=mexico,value=721,date="7/1/18"&lt;BR /&gt;
id=11118,vendor=splunk,name=tacos,value=221,date="5/1/18"&lt;BR /&gt;
id=11119,vendor=random,name=burger,value=821,date="8/1/18"&lt;BR /&gt;
id=11120,vendor=opera,name=browser,value=921,date="9/1/18"&lt;/P&gt;

&lt;P&gt;I would like to create a search that identifies any time where vendor, name,  value, and date all have the same values but id is different. (vendor=splunk rows for example above) There are other fields in the event data but this would be what I'm looking for specifically.&lt;/P&gt;</description>
    <pubDate>Wed, 04 Sep 2019 21:24:43 GMT</pubDate>
    <dc:creator>uhaba</dc:creator>
    <dc:date>2019-09-04T21:24:43Z</dc:date>
    <item>
      <title>Hunting for duplicate event data to find suspicious activities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hunting-for-duplicate-event-data-to-find-suspicious-activities/m-p/472321#M192296</link>
      <description>&lt;P&gt;I am trying to determine the right SPL to dig through a financial data set and look for duplicate entries. The data generally is unique but occasionally a vendor may submit a duplicate request resulting in bad things. &lt;/P&gt;

&lt;P&gt;Test data:&lt;BR /&gt;
id=11111,vendor=blah,name=tacoco,value=201,date="1/1/18"&lt;BR /&gt;
id=11112,vendor=abc,name=jump,value=321,date="2/1/18"&lt;BR /&gt;
id=11113,vendor=sneeze,name=china,value=421,date="3/1/18"&lt;BR /&gt;
id=11114,vendor=alpha,name=pooch,value=521,date="4/1/18"&lt;BR /&gt;
id=11115,vendor=splunk,name=tacos,value=221,date="5/1/18"&lt;BR /&gt;
id=11116,vendor=internet,name=golf,value=621,date="6/1/18"&lt;BR /&gt;
id=11117,vendor=office,name=mexico,value=721,date="7/1/18"&lt;BR /&gt;
id=11118,vendor=splunk,name=tacos,value=221,date="5/1/18"&lt;BR /&gt;
id=11119,vendor=random,name=burger,value=821,date="8/1/18"&lt;BR /&gt;
id=11120,vendor=opera,name=browser,value=921,date="9/1/18"&lt;/P&gt;

&lt;P&gt;I would like to create a search that identifies any time where vendor, name,  value, and date all have the same values but id is different. (vendor=splunk rows for example above) There are other fields in the event data but this would be what I'm looking for specifically.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 21:24:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hunting-for-duplicate-event-data-to-find-suspicious-activities/m-p/472321#M192296</guid>
      <dc:creator>uhaba</dc:creator>
      <dc:date>2019-09-04T21:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Hunting for duplicate event data to find suspicious activities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Hunting-for-duplicate-event-data-to-find-suspicious-activities/m-p/472322#M192297</link>
      <description>&lt;P&gt;Greetings @uhaba, try this run-anywhere search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| makeresults
| eval id     = "11111" ,
       vendor = "blah"  ,
       name   = "tacoco",
       value  = "201"   ,
       date   = "1/1/18"
| append 
    [ | makeresults
      | eval id     = "11115" ,
             vendor = "splunk"  ,
             name   = "tacos",
             value  = "221"   ,
             date   = "5/1/18" ]
| append 
    [ | makeresults
      | eval id     = "11118" ,
             vendor = "splunk"  ,
             name   = "tacos",
             value  = "221"   ,
             date   = "5/1/18" ]
| stats count values(id) as ids by vendor name value date
| where count &amp;gt; 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Output:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;vendor  name    value   date    count   ids
splunk  tacos   221 5/1/18  2      11115
                                            11118
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 04 Sep 2019 21:46:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Hunting-for-duplicate-event-data-to-find-suspicious-activities/m-p/472322#M192297</guid>
      <dc:creator>jacobpevans</dc:creator>
      <dc:date>2019-09-04T21:46:58Z</dc:date>
    </item>
  </channel>
</rss>

