Splunk Search

removing duplicate with maximum value

RanjiRaje
Explorer

Hi All, Can anyone please help me on this ...

I am framing a SPL query to get list of hosts with their last eventtime.

SPL query:  

| tstats max(_time) as latest where index=indexname by host  | convert ctime(latest)

From this query, I am getting the list as expected, but with one bug. (If I have a host both in lower case & in upper case, I am getting 2 different entries)

Eg:              host                            latest

             HOSTNAME1               09/17/2024 15:27:49

             hostname1                   08/30/2024 15:27:00

             hostname2                   09/15/2024 15:27:49

             HOSTNAME2               09/13/2024 15:27:49

From here, I have to get only one entry for a host along with latest time. (For hostname1, I should get 09/17/2024 15:27:49, similarly for hostname2 I should get 09/15/2024 15:27:49)

I tried adding the command, 

| eval host=upper(host), latest=max(latest) | dedup host

But it is not considering max of "latest", and it just showing the single row for each host with random value of "latest"

Can you please suggest me the better way to achieve this. thanks

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @RanjiRaje ,

please try this:

| tstats max(_time) as latest where index=indexname by host  
| eval host=upper(host)
| stats max(latest) AS latest BY host
| convert ctime(latest)

Ciao.

Giuseppe

View solution in original post

PickleRick
SplunkTrust
SplunkTrust

You generally thought well but you have to cast your hostname to lowercase (or uppercase; doesn't matter as long as it's consistent) _before_ you do your stats.

EDIT: I didn't notice it started with tstats. Of course in this case @gcusello 's solution is the way to go.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @RanjiRaje ,

please try this:

| tstats max(_time) as latest where index=indexname by host  
| eval host=upper(host)
| stats max(latest) AS latest BY host
| convert ctime(latest)

Ciao.

Giuseppe

RanjiRaje
Explorer

thanks sir 🙂 

I was thinking something complex, but you made it very simple.

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...