<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: summarize transaction search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251521#M75163</link>
    <description>&lt;P&gt;Right now it does duration/day/user/ComputerName.  To change it to duration/day/user, just Remove every occurrence of "ComputerName" in the search. Or, if you need this in addition (both), then just add this to your search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| appendpipe | stats sum(Duration) BY date User
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To change the date, just add this to the end of the search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| fieldformat date=strftime(date, "%Y-%m-%d")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 21 Mar 2016 14:18:48 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2016-03-21T14:18:48Z</dc:date>
    <item>
      <title>summarize transaction search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251518#M75160</link>
      <description>&lt;P&gt;Whats the best way to summarize this data and subsequently search the results?  The reason i ask is because the docs mention there is a transaction command that may need to be swapped for an si* command?&lt;/P&gt;

&lt;P&gt;Here is the full search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=win sourcetype="WinEventLog:Security" source="WinEventLog:Security" EventCode=4624 OR EventCode=4634 Account_Name=* action=success  [inputlookup users.csv  | stats count by user  | table user  | rename user as Account_Name]
| eval User=if(mvcount(Account_Name)&amp;gt;1, mvindex(Account_Name,1), mvindex(Account_Name, 0)) 
| eval User=lower(User) 
| search NOT User=*$ 
| transaction User maxevents=2 startswith="EventCode=4624"  endswith="EventCode=4634" maxspan=-1 
| convert timeformat="%Y-%m-%d" ctime(_time) AS date 
| stats sum(duration) As Duration by date, User, ComputerName 
| eval Duration(M)=round((Duration/60), 0) 
| table  date,User,Duration(M),ComputerName
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 16:29:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251518#M75160</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-17T16:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: summarize transaction search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251519#M75161</link>
      <description>&lt;P&gt;Avoid &lt;CODE&gt;transaction&lt;/CODE&gt; like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=win sourcetype="WinEventLog:Security" source="WinEventLog:Security" EventCode=4624 OR EventCode=4634 Account_Name=* action=success [inputlookup users.csv | stats count by user | table user | rename user as Account_Name]
| eval User=if(mvcount(Account_Name)&amp;gt;1, mvindex(Account_Name,1), mvindex(Account_Name, 0)) 
| eval User=lower(User) 
| search NOT User=*$
| streamstats current=t count(eval(EventCode=4634)) AS SessionID BY User ComputerName
| stats earliest(_time) AS date latest(_time) AS latest BY User ComputerName SessionID
| eval Duration=latest - date
| bucket date span=1d
| stats sum(Duration) AS Duration BY date User ComputerName 
| eval Duration(M)=round((Duration/60), 0) 
| table date User Duration(M) ComputerName
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 20 Mar 2016 23:26:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251519#M75161</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-03-20T23:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: summarize transaction search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251520#M75162</link>
      <description>&lt;P&gt;That's cool and runs quicker.&lt;BR /&gt;
Can date be converted as it was?&lt;/P&gt;

&lt;P&gt;| convert timeformat="%Y-%m-%d" ctime(_time) AS date &lt;/P&gt;

&lt;P&gt;Also there a way to Aggregate the number of events per day/ per user?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 09:47:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251520#M75162</guid>
      <dc:creator>smudge797</dc:creator>
      <dc:date>2016-03-21T09:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: summarize transaction search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251521#M75163</link>
      <description>&lt;P&gt;Right now it does duration/day/user/ComputerName.  To change it to duration/day/user, just Remove every occurrence of "ComputerName" in the search. Or, if you need this in addition (both), then just add this to your search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| appendpipe | stats sum(Duration) BY date User
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To change the date, just add this to the end of the search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| fieldformat date=strftime(date, "%Y-%m-%d")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 21 Mar 2016 14:18:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/summarize-transaction-search/m-p/251521#M75163</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-03-21T14:18:48Z</dc:date>
    </item>
  </channel>
</rss>

