Splunk Search

How to calculate the number of times the same event has occured in an index?

MG
Engager

How to calculate the number of times the same event has occured in an index

Labels (1)
0 Karma

GaetanVP
Contributor

Hello MG, 

As far as I know, you will never have the exact same event inside an index since each event has been indexed at a specific time.

You can easily count the number of "similar" event based on keys and values to compare, which can lead you to what you call "same event".

For instance if the same user visited the same page during the last hour, we could consider that those two events are similar, and you can count those within a Splunk search over the last our, something like :

index="myindex" user="user1" url="mywebsite/mypage"


Note that this search really depend on the sourcetype of the logs you're looking for of course...

I hope it helps!
Regards,

GaetanVP




0 Karma

MG
Engager

You are right..Another query I have is..

Calculating the size of an index and triggering the alert. If an alert triggered for one index then it should not trigger the same alert  for next  2hour . But it should trigger alert for other indexes.

 

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...