Splunk Search

transaction - solution for scheduling

the_wolverine
Champion

Is there a solution where a transactional query, run as a cron, can be forced to find all related events?

As I see it, if the matching events fall outside of the scheduled time period, those events won't be included in the transaction.

Tags (2)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Indeed, if your search is timerange-restricted nothing outside that timerange will get through.

You could however do something like this:

some filters, wide timerange [some other filters, narrow timerange | return 99999 id] | transaction id

That way you would determine the relevant IDs based on some narrow timerange, but widen the search for those IDs only to "fill up" your transactions. I'm just not sure how well you can specify these two ranges in the saved search, might require some fiddling...

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...