Getting Data In

Filter Duplicate Windows Events

jchampagne
Path Finder

Upon logon, multiple events with the same data are generated on our active directory domain controllers for a single user logon. We'd like to filter out the duplicate events (which occur within seconds of each other) so that only one logon event is indexed by Splunk.

Is this possible?

0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

jchampagne
Path Finder

That was my fear. Thanks!

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...