Splunk Search

Transactions based on distinct values of extracted field

mjuopperi_elisa
New Member

Hi,

I'm trying to create transactions from events like this:

Session opened: [some id]

Session closed: [some id]

For a single id I can just use a search like this:

some_id | transaction startswith="Session closed" endswith="Session opened" maxpause=30m
to find sessions that had a break of at most 30 minutes.

The session_id I'm searching with is an extracted field. How would I go about finding the count of these transactions (closed -> opened) per session_id?

This is what I would like to get out:

session           connection_breaks
-----------------------------------
session1          1
session2          5
session3          2
0 Karma

somesoni2
Revered Legend

Try like this

some_id | transaction session_id startswith="Session closed" endswith="Session opened" maxpause=30m 
| stats count as connection_breaks by session_id
0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...