Splunk Enterprise

How to Filter duplicate event logs with different event id?

auaave
Communicator

Hey guys,

I have an Error Log table with fields Event ID, Start, End, Duration, Location, Error Code.
How can I filter out events with same Start, End, Location, Error Code but different Event ID?

Thanks a lot!`

| eval DURATION=round(DURATION/60)
| stats count(DURATION) AS "ERROR_QTY" BY 'ERROR CODE' 
Tags (1)
0 Karma
1 Solution

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

View solution in original post

auaave
Communicator

Hi Guys,

all good, didn't know I can use dedup for more than 1 fields

0 Karma

lloydknight
Builder

Hello @auaave

will you kindly share a sample log for us to better address your question? Thank you.

0 Karma

auaave
Communicator

@ lloydknight, thank you for reply,,, all good now I used dedup for multiple field

0 Karma

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...