Splunk Search

Combining 2 searches but need help with dedup strategy

SS1
Path Finder

Hi,

I have 2 searches where the dedup strategy is different, i want to combine the 2 searches but need help with dedup strategy. 

Search 1: index=prod sourcetype=error AND "IOS" | dedup notification, source 

Search 2: index=prod sourcetype=error AND "Android" | dedup _time

-> For "IOS" i need to dedup with only notification, source  and for "Android" i need to dedup only with _time

index=prod sourcetype=error AND ("IOS" OR "Android") | dedup ?????

 

Labels (5)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

To do that in a single search, if Android does not have notification and source fields, then you could make these fields the same as time and then just dedup on those two fields

index=prod sourcetype=error AND ("IOS" OR "Android") 
| eval notification=coalesce(notification, _time)
| eval source=coalesce(source, _time)
| dedup notification source

as long as _time would never equal a real notification/source pair from IOS. stats command is another option if you can decide what you want to get out of the result.

 

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...