Splunk Enterprise

How to Filter duplicate event logs with different event id?

auaave
Communicator

Hey guys,

I have an Error Log table with fields Event ID, Start, End, Duration, Location, Error Code.
How can I filter out events with same Start, End, Location, Error Code but different Event ID?

Thanks a lot!`

| eval DURATION=round(DURATION/60)
| stats count(DURATION) AS "ERROR_QTY" BY 'ERROR CODE' 
Tags (1)
0 Karma
1 Solution

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

View solution in original post

auaave
Communicator

Hi Guys,

all good, didn't know I can use dedup for more than 1 fields

0 Karma

lloydknight
Builder

Hello @auaave

will you kindly share a sample log for us to better address your question? Thank you.

0 Karma

auaave
Communicator

@ lloydknight, thank you for reply,,, all good now I used dedup for multiple field

0 Karma

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...