Splunk Search

How to search for a event which is having multiple sourcetypes

rkishoreqa
Communicator

I have a requirement to find the duplicate events which are logged in Splunk with multiple sourcetypes.
For each log we have a unique id : 8b18881a-c6fe-4561-91f3-61c31b1afef5.  I am able to get the logs with this unique id (multiple logs with different sourcetypes)

Is there any way to find the sourcetypes which are having the unique id, like as below.

unique id                                                                                  sourcetype1    sourcetype2           sourcetype2
8b18881a-c6fe-4561-91f3-61c31b1afef5             st_dev                st1_dev1
21edc48b-0d90-43f2-bc1f-3dc6e322c821          st_dev                st1_dev1                    st3_dev3

 

 

Labels (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try this

<your search>
| stats values(sourcetype) as sourcetypes by unique_id
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Try this

<your search>
| stats values(sourcetype) as sourcetypes by unique_id
---
If this reply helps you, Karma would be appreciated.
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...