Splunk Search

Count number of occurrences of a field in a transaction search

kagouros1
Explorer

Hi,

i am creating a correlation between two different event sources and then run a transaction based on the src ip like so:

index=i1 OR index=i2|transaction src_ip|table src_ip,value_from_index1,value_from_index2

Now I would like to have a column that tells me how many events of index1 and index2 each are in the result.
Something like |eval foo=mvcount(value_from_index1) gives me the number of different events, but I want the total number.

Any help would be appreciated.

Konstantin

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

Are you sure you need to make a transaction? stats can usually do much of the tasks (and faster), along these lines;

index=i1 OR index=i2 | stats c(index1_field) c(index2_field) by src_ip

/K

0 Karma

kristian_kolb
Ultra Champion

or make a timechart

0 Karma

linu1988
Champion

You can use | bucket _time span=5m / bin to group events time wise.

0 Karma

kagouros1
Explorer

OK i forgot to put the 'maxspan=5m' in the search string. That's why I did it as a transaction as I only want to match those that happen in a certain time frame.

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...