<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using dedup with multiple  fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244384#M72794</link>
    <description>&lt;P&gt;Yes, fixed. now.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jul 2016 15:44:27 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2016-07-06T15:44:27Z</dc:date>
    <item>
      <title>Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244372#M72782</link>
      <description>&lt;P&gt;I can do the following separately, and I get the results I want.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="wineventlog" EventIdentifier="4624" | dedup ComputerName
index="wineventlog" EventIdentifier="4688" AND (New_Process_Name="*word.exe*" OR New_Process_Name="*excel.exe*" OR New_Process_Name="*outlook.exe*") | dedup New_Process_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm having trouble combining the two.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 22:08:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244372#M72782</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-05T22:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244373#M72783</link>
      <description>&lt;P&gt;What results are you looking for?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2016 23:00:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244373#M72783</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-07-05T23:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244374#M72784</link>
      <description>&lt;P&gt;did you tried with the "append" command?&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 06:35:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244374#M72784</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2016-07-06T06:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244375#M72785</link>
      <description>&lt;P&gt;use comma to combine multiple dedup fields .&lt;/P&gt;

&lt;P&gt;dedup Computer_Name,New_Process_Name &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:08:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244375#M72785</guid>
      <dc:creator>peters1901</dc:creator>
      <dc:date>2020-09-29T10:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244376#M72786</link>
      <description>&lt;P&gt;It really depends on what you are trying to do (your question is too vague).  Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="wineventlog" EventIdentifier="4624" | dedup ComputerName
| append [ search
   index="wineventlog" EventIdentifier="4688" AND (New_Process_Name="*word.exe*" OR New_Process_Name="*excel.exe*" OR New_Process_Name="*outlook.exe*") | dedup New_Process_Name]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index="wineventlog" (EventIdentifier="4624" OR (EventIdentifier="4688" AND (New_Process_Name="*word.exe*" OR New_Process_Name="*excel.exe*" OR New_Process_Name="*outlook.exe*"))) | dedup ComputerName New_Process_Name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 06 Jul 2016 13:43:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244376#M72786</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-06T13:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244377#M72787</link>
      <description>&lt;P&gt;As I said, I want to combine the two searches. I don't know how I can make it any more specific than that.&lt;/P&gt;

&lt;P&gt;First throws an error ("unknown command index") and second only matches event 4688.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:26:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244377#M72787</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-06T14:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244378#M72788</link>
      <description>&lt;P&gt;Same results as using woodcock's answer. I only get results for event 4688.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:32:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244378#M72788</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-06T14:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244379#M72789</link>
      <description>&lt;P&gt;Just now got append working.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:40:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244379#M72789</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-06T14:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244380#M72790</link>
      <description>&lt;P&gt;You need &lt;CODE&gt;...| append [**search** index ...]&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:41:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244380#M72790</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-06T14:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244381#M72791</link>
      <description>&lt;P&gt;This should do it&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index="wineventlog" (EventIdentifier="4624") OR ( EventIdentifier="4688" AND (New_Process_Name="*word.exe*" OR New_Process_Name="*excel.exe*" OR New_Process_Name="*outlook.exe*")) | eval dedupfield=if(EventIdentifier="4624", ComputerName,  New_Process_Name) | dedup dedupfield
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:43:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244381#M72791</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-07-06T14:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244382#M72792</link>
      <description>&lt;P&gt;index="wineventlog" EventIdentifier="4624" | dedup ComputerName&lt;BR /&gt;
 | append [ search index="wineventlog" EventIdentifier="4688" (New_Process_Name="&lt;EM&gt;word.exe&lt;/EM&gt;" OR New_Process_Name="&lt;EM&gt;excel.exe&lt;/EM&gt;" OR New_Process_Name="&lt;EM&gt;outlook.exe&lt;/EM&gt;") | dedup New_Process_Name]&lt;/P&gt;

&lt;P&gt;are you sure that the searches have results? I trided on my Splunk and I have the addition of the two searches&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:06:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244382#M72792</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-29T10:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244383#M72793</link>
      <description>&lt;P&gt;They did. As I said in my OP, both searches on their own produce results.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:46:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244383#M72793</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2016-07-06T14:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using dedup with multiple  fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244384#M72794</link>
      <description>&lt;P&gt;Yes, fixed. now.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 15:44:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-dedup-with-multiple-fields/m-p/244384#M72794</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-06T15:44:27Z</dc:date>
    </item>
  </channel>
</rss>

