Getting Data In

Filter Duplicate Windows Events

jchampagne
Path Finder

Upon logon, multiple events with the same data are generated on our active directory domain controllers for a single user logon. We'd like to filter out the duplicate events (which occur within seconds of each other) so that only one logon event is indexed by Splunk.

Is this possible?

0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

jchampagne
Path Finder

That was my fear. Thanks!

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...