<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Transaction Search Using different fields across multiple logs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25724#M4878</link>
    <description>&lt;P&gt;I do see one minor typo in your transaction command.  &lt;/P&gt;

&lt;P&gt;You can do either:&lt;/P&gt;

&lt;PRE&gt;transaction fields="IP_address,Username,transaction_id" connected=f maxspan=1h maxpause=35m&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;transaction IP_address Username transaction_id connected=f maxspan=1h maxpause=35m&lt;/PRE&gt;

&lt;P&gt;but you don't want the term &lt;CODE&gt;fields&lt;/CODE&gt; just sitting there before you list your fields.  I'm guessing this would look literally look for a field named "fields", which isn't what you want.&lt;/P&gt;</description>
    <pubDate>Thu, 05 Aug 2010 21:42:34 GMT</pubDate>
    <dc:creator>Lowell</dc:creator>
    <dc:date>2010-08-05T21:42:34Z</dc:date>
    <item>
      <title>Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25722#M4876</link>
      <description>&lt;P&gt;I am facing a problem with doing a transaction search across multiple logs (11 different sourcetypes) based on the example below.&lt;/P&gt;

&lt;P&gt;I will simplify the scenario to just 4 sourcetypes for illustration purposes&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;CODE&gt;sourcetype="web-access-logs"&lt;/CODE&gt; Common fields: Username, IP_address&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;sourcetype="application-logs"&lt;/CODE&gt; Common fields: Username, transaction_id&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;sourcetype="third-tier-app-logs"&lt;/CODE&gt; Common field: transaction_id&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;sourcetype="bmc-error-logs"&lt;/CODE&gt; Common field: Username&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Is there a way to craft a transaction search to pull out all events?&lt;/P&gt;

&lt;P&gt;In &lt;CODE&gt;sourcetype="web-access-logs"&lt;/CODE&gt;
I will want to pull out all activities based on the IP_address, as there will be no Username before the User logs into the portal and can only be tracked via the IP address until he logs in and the Username will appear, only then will we be able to link in the Username into the search.&lt;/P&gt;

&lt;P&gt;Ultimately we are looking at having all the results using the indirect linkages to form a transaction for troubleshooting purposes&lt;/P&gt;

&lt;P&gt;I tried a search as below&lt;/P&gt;

&lt;PRE&gt;sourcetype="*" | transaction fields IP_address,Username,transaction_id connected=f maxspan=1h maxpause=35m |search transaction_id="123456789"&lt;/PRE&gt;

&lt;P&gt;Unfortunately it is not working.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2010 16:53:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25722#M4876</guid>
      <dc:creator>manwin</dc:creator>
      <dc:date>2010-08-05T16:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25723#M4877</link>
      <description>&lt;P&gt;Do you need to look at many transactions at once for analysis purposes?  If not, a much simpler approach may be to build a form-search based view (or sets of views) and let a user drive the investigation instead of trying to do everything in a single search... just a thought.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2010 21:40:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25723#M4877</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-08-05T21:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25724#M4878</link>
      <description>&lt;P&gt;I do see one minor typo in your transaction command.  &lt;/P&gt;

&lt;P&gt;You can do either:&lt;/P&gt;

&lt;PRE&gt;transaction fields="IP_address,Username,transaction_id" connected=f maxspan=1h maxpause=35m&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;transaction IP_address Username transaction_id connected=f maxspan=1h maxpause=35m&lt;/PRE&gt;

&lt;P&gt;but you don't want the term &lt;CODE&gt;fields&lt;/CODE&gt; just sitting there before you list your fields.  I'm guessing this would look literally look for a field named "fields", which isn't what you want.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2010 21:42:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25724#M4878</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-08-05T21:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25725#M4879</link>
      <description>&lt;P&gt;Thanks I will test that out, the main reason why I need the transaction search is because the results is used to pull a user's transaction from the application which is spanning across different systems (11 of them in total) pulling out the entire transaction into a single view to understand the flow from start to end in a single view.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2010 14:59:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25725#M4879</guid>
      <dc:creator>manwin</dc:creator>
      <dc:date>2010-08-06T14:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25726#M4880</link>
      <description>&lt;P&gt;As with any complex search/view, I suggested either breaking the problem into smaller pieces if possible.  Also, start with a simple search you can get working, then build on top of it.  Only add a single new component (aka sourcetype) at a time, test and review your results and make sure to save off a working copy as you go (I find it helpful to simply copy-n-paste the search in a text editor along with some short notes about what's working and what's not.  You can use splunk to find your previous searches, but without knowing which one was working, it can be quite time consuming I've found.)&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2010 20:43:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25726#M4880</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2010-08-06T20:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25727#M4881</link>
      <description>&lt;P&gt;As Lowell, says, &lt;CODE&gt;transaction&lt;/CODE&gt; is for &lt;EM&gt;mass&lt;/EM&gt; assembly of many transactions. If you're trying to look up a single transaction based on a field, it's much more efficient to use subsearches or use forms and drilldown to select the specific events that make up a transaction.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2010 22:47:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25727#M4881</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2010-08-19T22:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: Transaction Search Using different fields across multiple logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25728#M4882</link>
      <description>&lt;P&gt;If your retrieval task is to see an entire transaction (either one or a handful of them), a subsearch is essential for performance. As gkanapathy and Lowell commented, you're pulling every event off disk and building a bunch of transactions just to throw most of them away.&lt;/P&gt;

&lt;P&gt;You probably want a search like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[search sourcetype="application-logs" transaction_id=&amp;lt;transaction_id&amp;gt; | dedup Username | fields Username] | transaction Username,transaction_id connected=f ...
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 25 Aug 2010 00:56:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Transaction-Search-Using-different-fields-across-multiple-logs/m-p/25728#M4882</guid>
      <dc:creator>Stephen_Sorkin</dc:creator>
      <dc:date>2010-08-25T00:56:51Z</dc:date>
    </item>
  </channel>
</rss>

