<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter results AFTER transaction function in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22913#M3991</link>
    <description>&lt;P&gt;Hmm.. Well im not positive that it's a bug, and others might still post more troubleshooting ideas, but at this point I'd send it in to &lt;A href="mailto:support@splunk.com"&gt;support@splunk.com&lt;/A&gt; so they can start looking at it for you and asking around internally.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2011 17:52:27 GMT</pubDate>
    <dc:creator>sideview</dc:creator>
    <dc:date>2011-06-06T17:52:27Z</dc:date>
    <item>
      <title>Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22910#M3988</link>
      <description>&lt;P&gt;I have data that requires I use "transaction" to form events.  I would like to filter the resulting data by a field (Source_IP) after the transaction function.  But using the where function seems to have no result.&lt;/P&gt;

&lt;P&gt;source=*.log |transaction maxspan=10s maxpause=2 |where Source_IP="192.168.168.73"|chart........&lt;/P&gt;

&lt;P&gt;The results still include all Source_IP's, not just the one in the where clause.&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 16:21:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22910#M3988</guid>
      <dc:creator>timmy13</dc:creator>
      <dc:date>2011-06-06T16:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22911#M3989</link>
      <description>&lt;P&gt;Here are some things I would double check. &lt;/P&gt;

&lt;P&gt;Are you sure the case is the same?  Field names are case sensitive. &lt;/P&gt;

&lt;P&gt;Does the &lt;CODE&gt;search&lt;/CODE&gt; command also fail to filter them out?   Generally I use &lt;CODE&gt;search&lt;/CODE&gt; unless I need something that only &lt;CODE&gt;where&lt;/CODE&gt; has, like &lt;CODE&gt;where fooField=barField&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;If you put wrap the IP in wildcards does it still fail to match?   It sounds dubious but maybe the extracted value ended up with a space character on one side or the other.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 16:59:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22911#M3989</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2011-06-06T16:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22912#M3990</link>
      <description>&lt;P&gt;Thanks for responding Nick.  Yes, I tried search as well with the same results.  And I have confirmed the case.  Wildcards around the IP doesn't resolve it.&lt;/P&gt;

&lt;P&gt;To make sure, I stuck the IP address in the first part of the search and got data.  Of course, searching before the transaction screws up my results.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 17:44:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22912#M3990</guid>
      <dc:creator>timmy13</dc:creator>
      <dc:date>2011-06-06T17:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22913#M3991</link>
      <description>&lt;P&gt;Hmm.. Well im not positive that it's a bug, and others might still post more troubleshooting ideas, but at this point I'd send it in to &lt;A href="mailto:support@splunk.com"&gt;support@splunk.com&lt;/A&gt; so they can start looking at it for you and asking around internally.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 17:52:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22913#M3991</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2011-06-06T17:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22914#M3992</link>
      <description>&lt;P&gt;After a transaction, all the fields of the transactions are merged into a single field.&lt;BR /&gt;
if they are the same, only one is kept, if they are different, they are all concatenated.&lt;/P&gt;

&lt;P&gt;example&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
search * |eval raw=_raw | table host source source_IP raw&lt;BR /&gt;
hostA sourceA  192.168.168.73 "myrawevent"&lt;BR /&gt;
hostA sourceA  192.168.168.10 "mysecondrawevent"&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;after the transastion&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
search | transaction |eval raw=_raw | table host source source_IP raw&lt;BR /&gt;
hostA sourceA "192.168.168.73 192.168.198.10" "myrawevent mysecondrawevent"&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;so you may want to filter using wildcards, like&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=*.log |transaction maxspan=10s maxpause=2 |WHERE Source_IP="*192.168.168.73*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=*.log |transaction maxspan=10s maxpause=2 | WHERE like(Source_IP,"%192.168.168.73%")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source=*.log |transaction maxspan=10s maxpause=2 |search Source_IP="*192.168.168.73*"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:01:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22914#M3992</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2020-09-28T10:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filter results AFTER transaction function</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22915#M3993</link>
      <description>&lt;P&gt;Seeing the same effect in 6.5.2 &lt;BR /&gt;
Trying to form events using transaction but exclude specific entries, WHERE, and SEARCH both don't seem to do anything after a transaction command.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2017 13:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filter-results-AFTER-transaction-function/m-p/22915#M3993</guid>
      <dc:creator>moesaidi</dc:creator>
      <dc:date>2017-07-26T13:39:03Z</dc:date>
    </item>
  </channel>
</rss>

