Splunk Enterprise

How to Filter duplicate event logs with different event id?

auaave
Communicator

Hey guys,

I have an Error Log table with fields Event ID, Start, End, Duration, Location, Error Code.
How can I filter out events with same Start, End, Location, Error Code but different Event ID?

Thanks a lot!`

| eval DURATION=round(DURATION/60)
| stats count(DURATION) AS "ERROR_QTY" BY 'ERROR CODE' 
Tags (1)
0 Karma
1 Solution

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

View solution in original post

auaave
Communicator

Hi Guys,

all good, didn't know I can use dedup for more than 1 fields

0 Karma

lloydknight
Builder

Hello @auaave

will you kindly share a sample log for us to better address your question? Thank you.

0 Karma

auaave
Communicator

@ lloydknight, thank you for reply,,, all good now I used dedup for multiple field

0 Karma

micahkemp
Champion

To keep only one combination of Start, End, Location, Error Code you could do:

| dedup Start End Location "Error Code"

I'm not sure this is what you are asking, though, so if not you may need to add some clarifying details (perhaps sample input and expected output).

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...