Splunk Search

How could I edit my search command in order to filter this table which will display the earliest time of the same value(

Jennifer
Path Finder

Hi, all!

How could I edit my search command in order to filter this table which will display the earliest time of the same value(Call_Session_ID)? 

Here is my original search command:

index="hkcivr" source="/appvol/wlp/DIVR01HK-AS01/applogs/progresshk.log*"| table Time Call_Session_ID

Jennifer_0-1643553224416.png

 

Labels (2)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

I'm not certain what you want as a final result, but perhaps this will help.

index="hkcivr" source="/appvol/wlp/DIVR01HK-AS01/applogs/progresshk.log*"
| stats min(_time) as Time by Call_Session_ID
| table Time Call_Session_ID
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

I'm not certain what you want as a final result, but perhaps this will help.

index="hkcivr" source="/appvol/wlp/DIVR01HK-AS01/applogs/progresshk.log*"
| stats min(_time) as Time by Call_Session_ID
| table Time Call_Session_ID
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...