Splunk Search

latest

vinod0313
Explorer

Hello

I have below logs in last 60 mins

log1: ABC=1,DEF=2,GHI=3

log2:ABC=0,DEF=0,GHI=3


while executing my query for last 60 mins

i am getting below result

ABC=1,DEF=2,GHI=3
ABC=0,DEF=0,GHI=0

But i want only latest log result as like below

ABC=1,DEF=2,GHI=3

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
...
| head 1
0 Karma

vinod0313
Explorer

could any please help me to find the solution.


0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try limiting the number of events with head

index="cx_aws" source="notification-service"
| head 1
| spath ...

I am not sure if this is the right query but it seems to be the one from your image. The point is that head will reduce the number of events from the base search, in this case to 1 i.e. the latest event

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the dedup command.

---
If this reply helps you, Karma would be appreciated.
0 Karma

vinod0313
Explorer

where should i use this command

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Put it at the end of your current search.
---
If this reply helps you, Karma would be appreciated.
0 Karma

vinod0313
Explorer

I kept dedup command at the end but it didnt worked

vinod0313_0-1598415435724.png

 

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...