Splunk Search

How to search for a event which is having multiple sourcetypes

rkishoreqa
Communicator

I have a requirement to find the duplicate events which are logged in Splunk with multiple sourcetypes.
For each log we have a unique id : 8b18881a-c6fe-4561-91f3-61c31b1afef5.  I am able to get the logs with this unique id (multiple logs with different sourcetypes)

Is there any way to find the sourcetypes which are having the unique id, like as below.

unique id                                                                                  sourcetype1    sourcetype2           sourcetype2
8b18881a-c6fe-4561-91f3-61c31b1afef5             st_dev                st1_dev1
21edc48b-0d90-43f2-bc1f-3dc6e322c821          st_dev                st1_dev1                    st3_dev3

 

 

Labels (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try this

<your search>
| stats values(sourcetype) as sourcetypes by unique_id
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Try this

<your search>
| stats values(sourcetype) as sourcetypes by unique_id
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Observability Cloud | Customer Survey!

If you use Splunk Observability Cloud, we invite you to share your valuable insights with us through a brief ...

Happy CX Day, Splunk Community!

Happy CX Day, Splunk Community! CX stands for Customer Experience, and today, October 3rd, is CX Day — a ...

.conf23 | Get Your Cybersecurity Defense Analyst Certification in Vegas

We’re excited to announce a new Splunk certification exam being released at .conf23! If you’re going to Las ...