Getting Data In

Filter Duplicate Windows Events

jchampagne
Path Finder

Upon logon, multiple events with the same data are generated on our active directory domain controllers for a single user logon. We'd like to filter out the duplicate events (which occur within seconds of each other) so that only one logon event is indexed by Splunk.

Is this possible?

0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

Not really. You can't correlate events with each other effectively in Splunk until after they are already indexed.

jchampagne
Path Finder

That was my fear. Thanks!

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...