<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange search behavior with &amp;quot;transaction&amp;quot; in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410352#M118382</link>
    <description>&lt;P&gt;The transaction command is very resource expensive command. You're using very basic transaction command (not additional transaction limiting options being used) and based on your data, the virtual memory usage could be very high and due to search being finalized, it may not be returning any data. I would say, try using stats instead of transaction for your search.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.2/Search/Abouttransactions#Using_stats_instead_of_transaction"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.2/Search/Abouttransactions#Using_stats_instead_of_transaction&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Aug 2018 17:13:59 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2018-08-16T17:13:59Z</dc:date>
    <item>
      <title>Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410351#M118381</link>
      <description>&lt;P&gt;Hello, &lt;BR /&gt;
Could someone explain me the following strange behavior with search&lt;/P&gt;

&lt;P&gt;With this type of search :&lt;/P&gt;

&lt;P&gt;sourcetype="cisco:esa:textmail"   | transaction internal_message_id  | search "&lt;A href="mailto:My_email_address@address.com" target="_blank"&gt;My_email_address@address.com&lt;/A&gt;"&lt;/P&gt;

&lt;P&gt;When i make a search on last 15 minutes, last hour or last 4 hours, my search work and return me answers .&lt;/P&gt;

&lt;P&gt;If i use a specified period time it work too.&lt;/P&gt;

&lt;P&gt;As soon as i use 24hours or more, the search give me no answer. &lt;/P&gt;

&lt;P&gt;How to explain this ?&lt;/P&gt;

&lt;P&gt;Sorry for my english and thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:55:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410351#M118381</guid>
      <dc:creator>cnoulin</dc:creator>
      <dc:date>2020-09-29T20:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410352#M118382</link>
      <description>&lt;P&gt;The transaction command is very resource expensive command. You're using very basic transaction command (not additional transaction limiting options being used) and based on your data, the virtual memory usage could be very high and due to search being finalized, it may not be returning any data. I would say, try using stats instead of transaction for your search.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.2/Search/Abouttransactions#Using_stats_instead_of_transaction"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.2/Search/Abouttransactions#Using_stats_instead_of_transaction&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Aug 2018 17:13:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410352#M118382</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-08-16T17:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410353#M118383</link>
      <description>&lt;P&gt;thank you for your answer.&lt;BR /&gt;
I'm a splunk noob and try some differents syntax with the stat command but no one work...&lt;BR /&gt;
Coulmd you help me and give me the syntax ?&lt;BR /&gt;
I try different functions but no one work.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 07:02:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410353#M118383</guid>
      <dc:creator>cnoulin</dc:creator>
      <dc:date>2018-08-17T07:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410354#M118384</link>
      <description>&lt;P&gt;another thing.&lt;BR /&gt;
The goal is to have a "unique" log entry when i visualize in splunk.&lt;BR /&gt;
Actually ESA send me one line by log and the complete mail transaction is very difficult to analyse.&lt;BR /&gt;
Mayube there is another solution to aggregate during indexing instead of during visualization ?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 07:06:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410354#M118384</guid>
      <dc:creator>cnoulin</dc:creator>
      <dc:date>2018-08-17T07:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410355#M118385</link>
      <description>&lt;P&gt;Add &lt;CODE&gt;keepevicted=true&lt;/CODE&gt; to your query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="cisco:esa:textmail" | transaction internal_message_id keepevicted=true | search "My_email_address@address.com"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you run a query that will generates a lot of events without it you will find a green exclamation mark beside "job" with this message:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Some transactions have been discarded. To include them, add keepevicted=true to your transaction command.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Aug 2018 09:08:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410355#M118385</guid>
      <dc:creator>aakwah</dc:creator>
      <dc:date>2018-08-17T09:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410356#M118386</link>
      <description>&lt;P&gt;it work, perfect !&lt;BR /&gt;
Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 09:17:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410356#M118386</guid>
      <dc:creator>cnoulin</dc:creator>
      <dc:date>2018-08-17T09:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410357#M118387</link>
      <description>&lt;P&gt;Welcome ! &lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 14:34:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410357#M118387</guid>
      <dc:creator>aakwah</dc:creator>
      <dc:date>2018-08-17T14:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Strange search behavior with "transaction"</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410358#M118388</link>
      <description>&lt;P&gt;@cnoulin as @somesoni2 mentioned, stats is a better option for your use case. However, for us to assist you better you would need to provide more details on what fields and values you want to show after correlating them. If you lookup Splunk Answers you will find several examples.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="cisco:esa:textmail" 
| stats count as eventCount min(_time) as _time max(_time) as LatestTime internal_message_id 
| eval duration=LatestTime-_time
| fields - LatestTime
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Aug 2018 14:46:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-search-behavior-with-quot-transaction-quot/m-p/410358#M118388</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-08-17T14:46:13Z</dc:date>
    </item>
  </channel>
</rss>

