Splunk Search

Transaction command not returning results

ssaenger
Communicator

I would like to extract from my log file user details on how many time they have had a request to the SGW where the number of times is gretaer than 1.
I would like to make a table showing the user_id and number of times they made the request.

i would also like to do a total count of users with more than 1 request.

I thought transaction would do this, however its not resolving any results and seems to be very slow when running the search.

index=sgw sourcetype=sgw_log Request_type=Open TxType=Request | transaction user_id | where eventcount>1 | table user_id eventcount

thanks,

Tags (2)
0 Karma

lguinn2
Legend

You don't need the transaction command for this. I would avoid using the transaction command, if possible, because it is not nearly as efficient as stats.

 index=sgw sourcetype=sgw_log Request_type=Open TxType=Request 
| stats count as request_count by user_id 
| appendpipe [ stats count(eval(request_count>1)) as "Users with Multiple Requests") ]

If you only want to list the users with multiple requests:

 index=sgw sourcetype=sgw_log Request_type=Open TxType=Request 
| stats count as request_count by user_id 
| where request_count > 1
|  appendpipe [ stats count as "Users with Multiple Requests") ]
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...