<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fields value correlation not working in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243008#M72305</link>
    <description>&lt;P&gt;The transaction command creates multi-valued fields for service layer and elapsed time, but no particular ordering is guaranteed across the fields. To achieve your table, I would do this instead - which is also much faster:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=index  MessageIdentifier=*
|stats earliest(_time) as Time list(ElapsedTime) as ElapsedTime  
by InterfaceName BusinessIdentifier MessageIdentifier ServiceLayerName
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If this doesn't look the way you like, please comment.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Nov 2016 04:52:39 GMT</pubDate>
    <dc:creator>lguinn2</dc:creator>
    <dc:date>2016-11-21T04:52:39Z</dc:date>
    <item>
      <title>Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243005#M72302</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have a query regarding ordering of ElapsedTime field. It is not coming properly with associated ServiceLayerName.&lt;/P&gt;

&lt;P&gt;I want to have a table which shows tabular details of fields and Message Identifier is common in them. I am using transaction command to group Message Identifier. For each InterfaceName there are couple of ServiceLayerNames and associated ElapsedTime with them. Issue is when I run below query fields are grouped and showing result but ElapsedTime is out of order for different ServiceLayerName.&lt;/P&gt;

&lt;P&gt;For e.g. Below is my query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=index  MessageIdentifier= | transaction MessageIdentifier 
| table _time InterfaceName BusinessIdentifier MessageIdentifier ServiceLayerName ElapsedTime 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Output:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time         InterfaceName   BusinessIdentifier  MessageIdentifier  ServiceLayerName  ElapsedTime  
2016-11-03    Interface       BI                  MI                 A                 00:00:00.085
                                                                     B                 00:00:00.091
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Time: 00:00:00.085 should be associated with B and 00:00:00.091 should be with A but associated values are not correct. I think table command is just presenting ElapsedTime value and not correlated with ServiceLayerName.&lt;/P&gt;

&lt;P&gt;Can you please advise how to correct this or any other way to formulate the query. &lt;/P&gt;

&lt;P&gt;Thanks&lt;BR /&gt;
Hemendra&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 02:48:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243005#M72302</guid>
      <dc:creator>hemendralodhi</dc:creator>
      <dc:date>2016-11-21T02:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243006#M72303</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/2181i571F93922749583A/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 02:53:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243006#M72303</guid>
      <dc:creator>hemendralodhi</dc:creator>
      <dc:date>2016-11-21T02:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243007#M72304</link>
      <description>&lt;P&gt;This is how output looks like.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 02:54:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243007#M72304</guid>
      <dc:creator>hemendralodhi</dc:creator>
      <dc:date>2016-11-21T02:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243008#M72305</link>
      <description>&lt;P&gt;The transaction command creates multi-valued fields for service layer and elapsed time, but no particular ordering is guaranteed across the fields. To achieve your table, I would do this instead - which is also much faster:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=index  MessageIdentifier=*
|stats earliest(_time) as Time list(ElapsedTime) as ElapsedTime  
by InterfaceName BusinessIdentifier MessageIdentifier ServiceLayerName
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If this doesn't look the way you like, please comment.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 04:52:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243008#M72305</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-11-21T04:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243009#M72306</link>
      <description>&lt;P&gt;Thanks Iguinn for your quick response.&lt;/P&gt;

&lt;P&gt;I see the results are coming as correct but without transaction cmd earlier it was also coming. Of course it is fast now. I want to have grouping on Message Identifier as that is unique across all other fields too. When I run transaction on above query it is not grouping MI. Result is coming as three separate instance  of MI(3 value) each having 2 elapsed time value like below&lt;/P&gt;

&lt;P&gt;InterfaceName   BusinessIdentifier  MessageIdentifier   ServiceLayerName    Time    ElapsedTime&lt;BR /&gt;
Interface            BI                                       MI                                      Service Layer   147816445700:00:00.085&lt;BR /&gt;
                                                                                                                                                                        00:00:00.091&lt;BR /&gt;
I want to have something like in above screenshot where grouping can be done for multiple same value message identifier and it shows associated servicelayer name and Elapsed Time.&lt;/P&gt;

&lt;P&gt;Thanks much.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 08:13:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243009#M72306</guid>
      <dc:creator>hemendralodhi</dc:creator>
      <dc:date>2016-11-21T08:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243010#M72307</link>
      <description>&lt;P&gt;You shouldn't be running &lt;CODE&gt;transaction&lt;/CODE&gt; at all for your problem. It is slow and not a good fit.&lt;/P&gt;

&lt;P&gt;If you like the earlier look with with group, then do this&lt;/P&gt;

&lt;P&gt;index=index  MessageIdentifier=*&lt;BR /&gt;
   |stats earliest(_time) as Time list(ServiceLayerName) as ServiceLayerName&lt;BR /&gt;
             list(ElapsedTime) as ElapsedTime&lt;BR /&gt;&lt;BR /&gt;
             by InterfaceName BusinessIdentifier MessageIdentifier&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 12:38:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243010#M72307</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-11-21T12:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243011#M72308</link>
      <description>&lt;P&gt;You are awesome!! It is working absolutely fine and super fast.&lt;/P&gt;

&lt;P&gt;I read that transaction is for grouping similar value fields , thats why used it. I was not aware that we have other methods also to by pass it. Thanks much - upvoted.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 00:46:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243011#M72308</guid>
      <dc:creator>hemendralodhi</dc:creator>
      <dc:date>2016-11-22T00:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Fields value correlation not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243012#M72309</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=index MessageIdentifier= | stats min(_time) AS _time list(ServiceLayerName) AS ServiceLayerName list(ElapsedTime) AS ElapsedTime BY InterfaceName BusinessIdentifier MessageIdentifier
| table _time InterfaceName BusinessIdentifier MessageIdentifier ServiceLayerName ElapsedTime
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 25 Mar 2017 06:24:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Fields-value-correlation-not-working/m-p/243012#M72309</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-03-25T06:24:30Z</dc:date>
    </item>
  </channel>
</rss>

