Getting Data In

Filter Duplicate Windows Events

jchampagne
Path Finder

Upon logon, multiple events with the same data are generated on our active directory domain controllers for a single user logon. We'd like to filter out the duplicate events (which occur within seconds of each other) so that only one logon event is indexed by Splunk.

Is this possible?

0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

jchampagne
Path Finder

That was my fear. Thanks!

0 Karma
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...