However, Splunk keeps grouping together two start events when it can't find an end. For example, if the event log looks like ......start.......start..........end....... I want it to group the 2nd start and end together and leave the first start as an orphan but splunk groups the two starts together despite my startswith and endswith condition. Any help would be greatly appreciated! Thanks!
Switching from startswith(type="start") endswith(type="end") to startswith="start" endswith="end" worked for me but could you explain why? I parse the type before the transaction so I don't see how this should affect it.