Splunk Search

Convert Transaction Search

bah5663_98
Explorer

I made the following search to group exceptions together that happened within 1 second but I want to be able to view the source and make the search more efficient. Is there a search that will yield the same results without using the transaction command?

index=java_logs Exception | transaction maxspan=1s

0 Karma
1 Solution

woodcock
Esteemed Legend

Yes, try this:

index=java_logs Exception | bin _time span=1s | stats list(_raw) AS events values(source) AS sources BY _time

View solution in original post

woodcock
Esteemed Legend

Yes, try this:

index=java_logs Exception | bin _time span=1s | stats list(_raw) AS events values(source) AS sources BY _time

richgalloway
SplunkTrust
SplunkTrust

Try index=java_logs Exception | bin span=1s _time | stats values(*) as * by _time

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...