Splunk Search

latest

vinod0313
Explorer

Hello

I have below logs in last 60 mins

log1: ABC=1,DEF=2,GHI=3

log2:ABC=0,DEF=0,GHI=3


while executing my query for last 60 mins

i am getting below result

ABC=1,DEF=2,GHI=3
ABC=0,DEF=0,GHI=0

But i want only latest log result as like below

ABC=1,DEF=2,GHI=3

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
...
| head 1
0 Karma

vinod0313
Explorer

could any please help me to find the solution.


0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try limiting the number of events with head

index="cx_aws" source="notification-service"
| head 1
| spath ...

I am not sure if this is the right query but it seems to be the one from your image. The point is that head will reduce the number of events from the base search, in this case to 1 i.e. the latest event

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the dedup command.

---
If this reply helps you, Karma would be appreciated.
0 Karma

vinod0313
Explorer

where should i use this command

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Put it at the end of your current search.
---
If this reply helps you, Karma would be appreciated.
0 Karma

vinod0313
Explorer

I kept dedup command at the end but it didnt worked

vinod0313_0-1598415435724.png

 

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...