Getting Data In

Unique Errors for Last Week over All Time

Joshua
Explorer

I currently have a search set up to identify an individual error clustered to show the total count, detail and last seen timestamp output into a CSV table over all time. This search is scheduled to run/update weekly.

log_level="ERROR" | cluster field=error showcount=true countfield=count | table, _time, count, error | sort _time| outputcsv errorhistory.csv

My goal is to use this as a refrence point whereby I can run an identical search across a period of a week / day to cross reference if the individual error has ever been seen before from the all time csv i.e. a true new error.

I have attempted various lookup's however am now stuck for a way on how to work it.

Tags (2)
0 Karma

Rob
Splunk Employee
Splunk Employee

Have you tried taking a look at using either the "uniq" function with your search?

http://www.splunk.com/base/Documentation/4.1.7/SearchReference/Uniq

You could do something such as:

log_level="ERROR" | uniq | cluster field=error showcount=true countfield=count | table, _time, count, error | sort _time| outputcsv errorhistory.csv

Joshua
Explorer

I have tried used this command however it will only return unique results from the search window selected such as that week. Which i can get by adding | search(count=1) |

Rather I need the unique results (i.e. count equal to 1) for the week and have not appeared in the errorhistory.csv

Any thoughts?

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...