Splunk Search

transaction command searchs according to replaced "_time" ?

crazyeva
Contributor

XXX | streamstats count | eval _time=count | sort _time | transaction maxspan=5s

I found "tranaction" is still using original "_time" but not repaced "_time" as "count"
How could I force transaction use replaced "_time"

Or I want to devide and group events by a certain number of them in order like:
No.1,2,3,4,5
6,7,8,9,10
11,12,13,14,15

Tags (1)
0 Karma
1 Solution

Ayn
Legend

Use bucket instead.

... | bucket count span=5 | stats values(...) by count

View solution in original post

Ayn
Legend

Use bucket instead.

... | bucket count span=5 | stats values(...) by count

Ayn
Legend

That idea is horribly ugly, I wrote that more in the "purely technical it could work in some weird situations" sense rather than as an actual suggestion. 🙂

0 Karma

crazyeva
Contributor

thank you! perfectly solved
but did you remember you have helped me:
http://splunk-base.splunk.com/answers/53991/can-i-transaction-a-search-with-a-range-field-not-strict...
when you said:"
.........
The only way I could think of is to violate the _time somehow by writing perduration to _time and let transaction operate on that.
"
I wished that could work! that may be quite useful

0 Karma
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...