Splunk Search

transaction command

riqbal47010
Path Finder

I have many events against session_id. but I am interested to only list down three type of events

1- AD authentication successful
2- RADUS authentication successful
3- SMS generated

Please advise

0 Karma

efavreau
Motivator

There could be many ways to optimize your query, if you provided one. However, with the information you provided, I might start with the text of those events and put that text in my base query. Let's say your "AD authentication successful" has that actual text in the events. Then in your base query (meaning the query before the first pipe):

index=yourindex source=yoursource sourcetype=yoursourcetype "*AD authentication successful*" rest of your base query
| your other statements
| transaction command details

Then when you run the query, your base query has already filtered down to the information you are looking for. As making your base query as specific as possible is also a best practice, you will gain the additional benefit of having a faster query.

###

If this reply helps you, an upvote would be appreciated.
0 Karma

rmmiller
Contributor

Also need to make sure that if "| your other statements" changes the order of the events, you'll need to use the sort command to put them back in reverse time order. The transaction command requires that.

0 Karma
Get Updates on the Splunk Community!

Index This | Divide 100 by half. What do you get?

November 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

❄️ Celebrate the season with our December lineup of Community Office Hours, Tech Talks, and Webinars! ...

Splunk and Fraud

Watch Now!Watch an insightful webinar where we delve into the innovative approaches to solving fraud using the ...