Splunk Search

How can you filter a transaction where at least one of the paired events matches the criteria?

jkimmel6
Explorer

I have a transaction that pairs events based on three fields. Is it possible to then filter the results so that it only shows the paired events if at least one of the events has the field ‘Type’ containing the character ‘X’?

0 Karma
1 Solution

xpac
SplunkTrust
SplunkTrust

Hey,

Sure you can. Transaction combines all events of a transaction into one event, so if you append a | search Type=*x* after the transaction, it should do what you want.

View solution in original post

0 Karma

xpac
SplunkTrust
SplunkTrust

Hey,

Sure you can. Transaction combines all events of a transaction into one event, so if you append a | search Type=*x* after the transaction, it should do what you want.

0 Karma

jkimmel6
Explorer

Perfect, thanks.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...