Splunk Search

Transaction in postprocessing removes all results without reason

luclepot
Engager

I have a saved search, which is used as the base search for my dashboard. There is no issue getting events from the saved search to show up fully on the dashboard.
As a part of post processing, I use the transaction command in different ways on the events. When I use this command in one of my post processing searches and include the startswith or endswith arguments for transaction, a "no results" is returned. However this is obviously wrong in my case; when I open the "no results" dash in a search, it returns the expected grouped events. Similarly, when inspecting the "no results" dash panel search, it reports returning x events and does not mention anything about a lack of results.
Again, this is only a problem when including startswith or endswith in a post-process dash panel search using a saved search as a base search. when using transaction without these arguments, there is no issue - however I really need these as a part of my search.

Does anybody know why transaction would be removing all events in this very specific case?

niketn
Legend

@luclepot instead of transaction, see if you can use stats for correlation. http://docs.splunk.com/Documentation/Splunk/latest/Search/Abouteventcorrelation

Also see if you can move stats to base search rather than post-process search. http://docs.splunk.com/Documentation/Splunk/latest/Viz/Savedsearches#Best_practices

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

renjith_nair
Legend

Hi @luclepot,

It should not be a problem with transaction but seems to be field extraction. If the startswith and endswith "fields" are extracted field, then try explicitly mentioning in the search by using field. By default dashboard runs on Smart Mode which might not be extracting all fields. Reference : http://docs.splunk.com/Documentation/Splunk/7.1.2/Search/Changethesearchmode

So try your search terms|"other field extractions" | fields startswith,endswith ,other required fields | rest of your search

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...