Splunk Search

Transitive Transaction attributes

bleinfelder
Path Finder

Hi there,

I'm doing analysis on file transfer logs from different transfer system. I want to follow the file through the different systems, and unfortunately they change their names every now and then. Meanwhile I normalized all the relevant fields, so I have events like that:

sourcefile=aafile destfile=aafile

sourcefile=aafile destfile=bbfile

sourcefile=bbfile destfile=ccfile

sourcefile=ccfile destfile=ddfile

I want all these events grouped into one transaction. So far, with " | transaction sourcefile destfile", whenever the filename changes, a new transaction starts.

I found similar questions here, but no answer. Any help?

Regards,

Bernd

Tags (1)
0 Karma
1 Solution

bleinfelder
Path Finder

Hi there,

I found a solution for this: Create a multivalued field that contains sourcefile and destfile and make the transaction with that field:

sourcetype=mysourcetype| eval txattrib=mvappend(sourcefile,null,destfile) | transaction txattrib

With that expression, all four events are grouped to one transaction.

Regards,

Bernd

View solution in original post

0 Karma

bleinfelder
Path Finder

Hi there,

I found a solution for this: Create a multivalued field that contains sourcefile and destfile and make the transaction with that field:

sourcetype=mysourcetype| eval txattrib=mvappend(sourcefile,null,destfile) | transaction txattrib

With that expression, all four events are grouped to one transaction.

Regards,

Bernd

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...