Splunk Search

Convert Transaction Search

bah5663_98
Explorer

I made the following search to group exceptions together that happened within 1 second but I want to be able to view the source and make the search more efficient. Is there a search that will yield the same results without using the transaction command?

index=java_logs Exception | transaction maxspan=1s

0 Karma
1 Solution

woodcock
Esteemed Legend

Yes, try this:

index=java_logs Exception | bin _time span=1s | stats list(_raw) AS events values(source) AS sources BY _time

View solution in original post

woodcock
Esteemed Legend

Yes, try this:

index=java_logs Exception | bin _time span=1s | stats list(_raw) AS events values(source) AS sources BY _time

richgalloway
SplunkTrust
SplunkTrust

Try index=java_logs Exception | bin span=1s _time | stats values(*) as * by _time

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...