Splunk Search

transaction - solution for scheduling

the_wolverine
Champion

Is there a solution where a transactional query, run as a cron, can be forced to find all related events?

As I see it, if the matching events fall outside of the scheduled time period, those events won't be included in the transaction.

Tags (2)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Indeed, if your search is timerange-restricted nothing outside that timerange will get through.

You could however do something like this:

some filters, wide timerange [some other filters, narrow timerange | return 99999 id] | transaction id

That way you would determine the relevant IDs based on some narrow timerange, but widen the search for those IDs only to "fill up" your transactions. I'm just not sure how well you can specify these two ranges in the saved search, might require some fiddling...

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...