Splunk Search

limiting error per event

cloud111
New Member

Hi,

I am new to splunk and would like guidance about how to only count 1 occurrence of the word ERROR per event.

example line:
2014-05-14 20:17:46,232 ERROR ejb.services.RestClientService Error processing response

my search is counting both errors in the line and i only need the first one

the search is:
index=main sourcetype=* source=* host=* ERROR source="D:/server.log"

Tags (1)
0 Karma

somesoni2
Revered Legend

WHat is your full search? How are you/search is counting it twice?

Are you just trying to select events with ERROR after timestamp? If yes try this

index=main sourcetype= source= host=* ERROR source="D:/server.log" | regex _raw="^\S+\s+\S+\s+ERROR\s.+"

If you're looking for just upper case ERROR, try this

index=main sourcetype= source= host=* CASE(ERROR) source="D:/server.log"
0 Karma

cloud111
New Member

Brilliant it works for me, I needed the first ERROR after the timestamp.
thanks so much for your help.

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...