Splunk Search

Better way of getting the series of events and all the field values

macadminrohit
Contributor

Right now i am using the transaction command to get a sequence of events based on a common field value. The resulting event from the transaction command has multiple fields with the same field name but different values, which is expected as transaction command has group different events together. The issue i am facing is i am not able to extract out those individual field values from that clubbed event.
Not sure if eventstats or streamstats will be a better way of doing what i am trying to achieve.

Tags (1)
0 Karma

hortonew
Builder

Are you trying to extract them via mvexpand (multi-value expand) or similar commands? Should be able to | transaction ... | mvexpand commonfield.

Also know if you're looking for a faster way to search and build these transactions, you can use a combination of eval to create a common field for ones that match via if/case statement, then doing stats command after.

Sukisen1981
Champion

can you please share a snap of what your data looks like and what is the expected search results?

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...