Splunk Enterprise

How to Filter duplicate event logs with different event id?

auaave
Communicator

Hey guys,

I have an Error Log table with fields Event ID, Start, End, Duration, Location, Error Code.
How can I filter out events with same Start, End, Location, Error Code but different Event ID?

Thanks a lot!`

| eval DURATION=round(DURATION/60)
| stats count(DURATION) AS "ERROR_QTY" BY 'ERROR CODE' 
Tags (1)
0 Karma
1 Solution

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

View solution in original post

auaave
Communicator

Hi Guys,

all good, didn't know I can use dedup for more than 1 fields

0 Karma

lloydknight
Builder

Hello @auaave

will you kindly share a sample log for us to better address your question? Thank you.

0 Karma

auaave
Communicator

@ lloydknight, thank you for reply,,, all good now I used dedup for multiple field

0 Karma

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...