Splunk Search

limiting error per event

cloud111
New Member

Hi,

I am new to splunk and would like guidance about how to only count 1 occurrence of the word ERROR per event.

example line:
2014-05-14 20:17:46,232 ERROR ejb.services.RestClientService Error processing response

my search is counting both errors in the line and i only need the first one

the search is:
index=main sourcetype=* source=* host=* ERROR source="D:/server.log"

Tags (1)
0 Karma

somesoni2
Revered Legend

WHat is your full search? How are you/search is counting it twice?

Are you just trying to select events with ERROR after timestamp? If yes try this

index=main sourcetype= source= host=* ERROR source="D:/server.log" | regex _raw="^\S+\s+\S+\s+ERROR\s.+"

If you're looking for just upper case ERROR, try this

index=main sourcetype= source= host=* CASE(ERROR) source="D:/server.log"
0 Karma

cloud111
New Member

Brilliant it works for me, I needed the first ERROR after the timestamp.
thanks so much for your help.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...