hello, I am trying to dedup events from successful authorizations in Splunk. Currently, our windows systems make about 4 events per authorization but we only want to see one. I would like to dedup based on time, 0.5 seconds for each event. Here is my current search: | tstats summariesonly=true allow_old_summaries=true count from datamodel=Authentication.Authentication where Authentication.user=* (Authentication.src=* OR Authentication.dest=*) Authentication.action=failure by Authentication.user, Authentication.src, Authentication.dest | rename "Authentication.*" as "*" | eval source&destination=mvappend(src,dest) | eventstats dc(source&destination) AS host_count by user | where host_count >= 1 | sort - host_count | table source&destination, user | head 250 How can i add a dedup by time here? Thanks!
... View more