Splunk Search

Dedup within a time range

eolg
New Member

I need to chart the sum of the values of a field by the value of another field over time (e.g. the sum of values of field A for all events that share the same value for field B). However, there is also a third field (field C), and if two events have same value for field C, I don't want them both included in the sum.

Generally, events with the same value for field C will be logged in Splunk at 2 minute intervals, but creating a timechart with a span of 2 minutes doesn't work perfectly because the time can be slightly more or less than 2 minutes. Is there a way to dedup events with the same field C within a certain time range? Or any other way to achieve this?

0 Karma
1 Solution

HiroshiSatoh
Champion
(your search)|bin span=2m _time|dedup _time,field_C

Can you do it?
I think that the condition is missing. Please present sample log.

View solution in original post

HiroshiSatoh
Champion
(your search)|bin span=2m _time|dedup _time,field_C

Can you do it?
I think that the condition is missing. Please present sample log.

tegamax
Engager

what does field_C supposed to do??

0 Karma

eolg
New Member

This worked perfectly! Thank you!

0 Karma

adonio
Ultra Champion

@eolg,
if it solved your questin, kindly accept the answer so other will know this solution worked for you

0 Karma
Get Updates on the Splunk Community!

What's New in Splunk Observability - October 2025

What’s New?  We’re excited to announce the latest enhancements to Splunk Observability Cloud and share what’s ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened Audit Trail v2 wasn’t written in isolation—it was shaped by your voices. In ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...