Dashboards & Visualizations

When using different inputs in the same dashboard, why am I getting the following error? : "duplicate values causing conflict"

pranay04
Explorer

I need to use two different inputs in one dashboard to filter the source. One for Apache and another for JBoss:

Apache :
      <input type="dropdown" token="WebAppTok" searchWhenChanged="true">
        <label>Apache Application</label>
        <fieldForLabel>count</fieldForLabel>
        <fieldForValue>source</fieldForValue>
Jboss:
     <input type="dropdown" token="jBossAppTok" searchWhenChanged="true">
        <label>jBoss Application</label>
        <fieldForLabel>count</fieldForLabel>
        <fieldForValue>source</fieldForValue>

Both the inputs work if I use them in separate dashboards, but I want to use it in the same dashboards, but I'm getting an error saying "duplicate values causing conflict".

Anyway I can get around that?

0 Karma

chrisyounger
SplunkTrust
SplunkTrust

On your search that is used to populate the dropdown, add |dedup FIELD so the search doesn't return duplicate values.

0 Karma

pranay04
Explorer

For both the inputs?

0 Karma

chrisyounger
SplunkTrust
SplunkTrust

yep thats correct

0 Karma

Vijeta
Influencer

@chrisyoungerjds -His search queries for each dropdown show dedup source, in the comment section in question.

0 Karma

Vijeta
Influencer

Can you type your query to populate the input. Is it a dropdown?

0 Karma

pranay04
Explorer

It is a drop down. Below is what I am using for the inputs for apache and jboss

Apache :


count
source

index=apache host=xxx source=*
| search access_request!="xxx"
| WHERE NOT ( cidrmatch("10.0.0.0/8",clientip) OR cidrmatch("172.16.0.0/12",clientip) OR cidrmatch("128.121.245.0/28",clientip) OR clientip="168.143.160.133" OR clientip="168.143.160.178" OR match(access_request, "(?i).(?:jpg|gif|png|js|css|swf|ico|bmp|pdf|xml)[\?# ]") ) | replace /logs/* with * in source | replace */access.log with * in source | dedup clientip | dedup source
| table source
-15m
now

abc

jBoss:

    <label>jBoss Application</label>
    <fieldForLabel>count</fieldForLabel>
    <fieldForValue>source</fieldForValue>
    <search>
      <query>index=jboss host=*ch*prd* source= a OR source= b OR source= c

| replace /logs/* with * in source | replace */server.log with * in source | dedup source
| table sourcee
-15m
now

xyz

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...