Splunk Search

inputlookup followed by transaction - No results found

landen99
Motivator

So I do the following search:

| inputlookup x | transaction y

y and z are a fields in lookup table x but the search returns with: No results found.
Adding table * and format commands before transaction do not help. Removing transaction yields the table normally.

I want to understand why transaction does not work and how to make it work.

0 Karma
1 Solution

chanfoli
Builder

The purpose of the transaction command is to group events based on constraints. It expects to be operating on events containing raw and time fields as well as the field(s) you want to constrain it with. It sounds like you are asking transaction to operate on a table of results which do not have all of the typical event fields. Depending on what you are doing before the first pipe above, perhaps you could get this to work by using append=true on the inputlookup command to preserve the actual event fields. It might help to see example results from your inputlookup to confirm what the problem is.

View solution in original post

chanfoli
Builder

The purpose of the transaction command is to group events based on constraints. It expects to be operating on events containing raw and time fields as well as the field(s) you want to constrain it with. It sounds like you are asking transaction to operate on a table of results which do not have all of the typical event fields. Depending on what you are doing before the first pipe above, perhaps you could get this to work by using append=true on the inputlookup command to preserve the actual event fields. It might help to see example results from your inputlookup to confirm what the problem is.

landen99
Motivator

You reminded me that transaction requires _time so I added it:

 | inputlookup x | eval _time=now() | transaction y

.. and it worked! Thank you.

mhergh
Explorer

great, your example showed that all that you need is to set the _time ... Worked for me too like a charm, many many thanks!!!

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...