Splunk Search

transaction query

srajanbabu
Explorer

I have a search as source="C:\\Data\\acctdata\\snm4-logger.log" | transaction FILENAME_FIELD keepevicted=true| where mvcount(BYTES_FIELD)>1 | table FILENAME_FIELD BYTES_FIELD
producing filename and bytes transferred in each file.
Also i have a search as source="C:\\Data\\acctdata\\snm4-logger.log" | transaction Plainuserip keepevicted=true| where mvcount(FILENAME_FIELD)>1 | table Plainuserip FILENAME_FIELD
producing username and files transferred by each user.
I want to combine the the above two searches to produce the result as follows

Plainuserip FILENAME_FIELD BYTES_FIELD
1 EMBT01UK file corpfile5430695 148 bytes transferred
148 bytes transferredSSNM5

Tags (1)
0 Karma

alacercogitatus
SplunkTrust
SplunkTrust

source="C:\\Data\\actdata\\snm4-logger.log" | transaction Plainuserip FILENAME_FIELD keepevicted = true | stats values(BYTES_FIELD) by Plainuserip FILENAME_FIELD

Might get you close to what you want.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...