<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: transaction command  rows for large dataset in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747581#M241849</link>
    <description>&lt;P&gt;The end goal is to find what was happening during the time between those two event ids, thank you for your help. I am very new to splunk so any thoughts on the best way to do that would be appreciated!&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jun 2025 16:16:54 GMT</pubDate>
    <dc:creator>N3gativeSpace</dc:creator>
    <dc:date>2025-06-05T16:16:54Z</dc:date>
    <item>
      <title>transaction command  rows for large dataset</title>
      <link>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747577#M241846</link>
      <description>&lt;P&gt;Here is my code:&lt;/P&gt;&lt;PRE&gt;index=example sourcetype=wineventlog computer_name="example"&lt;BR /&gt;| transaction computer_name startswith="event_id=4732" endswith="event_id=4733" maxspan=15m mvraw=true mvlist=true&lt;BR /&gt;| table _time, user.name, computer_name, event_id, _raw&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;I am trying to separate each event that occurs in order to get rid of fluff content such as "A security-enabled local group membership was enumerated." appearing hundreds of times. What would be the best way to do this? mvexpand has not worked for me so far.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 15:50:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747577#M241846</guid>
      <dc:creator>N3gativeSpace</dc:creator>
      <dc:date>2025-06-05T15:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: transaction command  rows for large dataset</title>
      <link>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747579#M241847</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"A security-enabled local group membership was enumerated." sounds like represented by a unique event_id. &amp;nbsp;Get rid of them in the search. &amp;nbsp;If there are specific key words/phrases that cannot be represented by event_id, the best is to use search term to eliminate. &amp;nbsp;Finally, if there are feature words that are too hard to construct using search terms, you can use regex to eliminate.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=example sourcetype=wineventlog computer_name="example"
  NOT event_id IN (fluff_id1, fluff_id2, fluff_id3)
  NOT "fluff term1" NOT "fluff term2" NOT "fluff term3"
| where NOT match(_raw, "fluff[r]egex1|fluf[f]regex2|fluf[fr]egex3")&lt;/LI-CODE&gt;&lt;P&gt;Not sure how transaction gets into the picture, however.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 16:08:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747579#M241847</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2025-06-05T16:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: transaction command  rows for large dataset</title>
      <link>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747580#M241848</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/310725"&gt;@N3gativeSpace&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you only want&amp;nbsp;&amp;nbsp;event_id=4732 and event_id=4733?&lt;/P&gt;&lt;P&gt;If so I'd look at doing something like this&lt;/P&gt;&lt;PRE&gt;index=example sourcetype=wineventlog computer_name="example" event_id IN (4732,4733)&lt;BR /&gt;| eval is{event_id}=1&lt;BR /&gt;| stats sum(is4732) as count4732, sum(is4733) as count4733, values(user.name), earliest(_time) as startTime, latest(_time) as endTime, values(event_id) by computer_name &lt;BR /&gt;| where count4732&amp;gt;=1 AND count4733&amp;gt;=1&lt;/PRE&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 16:18:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747580#M241848</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-06-05T16:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: transaction command  rows for large dataset</title>
      <link>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747581#M241849</link>
      <description>&lt;P&gt;The end goal is to find what was happening during the time between those two event ids, thank you for your help. I am very new to splunk so any thoughts on the best way to do that would be appreciated!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 16:16:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/transaction-command-rows-for-large-dataset/m-p/747581#M241849</guid>
      <dc:creator>N3gativeSpace</dc:creator>
      <dc:date>2025-06-05T16:16:54Z</dc:date>
    </item>
  </channel>
</rss>

