Splunk Search

Transactions based on distinct values of extracted field

mjuopperi_elisa
New Member

Hi,

I'm trying to create transactions from events like this:

Session opened: [some id]

Session closed: [some id]

For a single id I can just use a search like this:

some_id | transaction startswith="Session closed" endswith="Session opened" maxpause=30m
to find sessions that had a break of at most 30 minutes.

The session_id I'm searching with is an extracted field. How would I go about finding the count of these transactions (closed -> opened) per session_id?

This is what I would like to get out:

session           connection_breaks
-----------------------------------
session1          1
session2          5
session3          2
0 Karma

somesoni2
Revered Legend

Try like this

some_id | transaction session_id startswith="Session closed" endswith="Session opened" maxpause=30m 
| stats count as connection_breaks by session_id
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...