Splunk Search

Counting duplicates when filed equals value

alwinaugustin
Engager

I have the following scenario where duplicate accounts has been created for a transaction id value. I would like to count how many duplicates has been created and list it as a table. I compare the message with a string, which indicates the successful creation of the account. The current query is as follows:

 

index=myindex sourcetype=mysourcetype | spath message | search message="Account Created Successfully" |stats count by transactionId

 

I have the following format for logs

 

{ 
   level: info
   message: Account Created Successfully
   timestamp: 2021-08-02T05:58:44-04:00
   transactionId: 100200300
}

 

 

The above search query is not giving me the correct counts. I manually checked the logs for the transaction ID, but the `stats` count is wrong. How can I modify the query to get accurate counts ?

Labels (2)
0 Karma

manjunathmeti
Champion

hi @alwinaugustin,

Is fields message and  trasnsactionId are already extracted in your events? If not, you need to just use spath.

index=myindex sourcetype=mysourcetype "Account Created Successfully" | spath | stats count by transactionId

 

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...