Splunk Search

Better way of getting the series of events and all the field values

macadminrohit
Contributor

Right now i am using the transaction command to get a sequence of events based on a common field value. The resulting event from the transaction command has multiple fields with the same field name but different values, which is expected as transaction command has group different events together. The issue i am facing is i am not able to extract out those individual field values from that clubbed event.
Not sure if eventstats or streamstats will be a better way of doing what i am trying to achieve.

Tags (1)
0 Karma

hortonew
Builder

Are you trying to extract them via mvexpand (multi-value expand) or similar commands? Should be able to | transaction ... | mvexpand commonfield.

Also know if you're looking for a faster way to search and build these transactions, you can use a combination of eval to create a common field for ones that match via if/case statement, then doing stats command after.

Sukisen1981
Champion

can you please share a snap of what your data looks like and what is the expected search results?

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...