Splunk Search

Transactions based on distinct values of extracted field

mjuopperi_elisa
New Member

Hi,

I'm trying to create transactions from events like this:

Session opened: [some id]

Session closed: [some id]

For a single id I can just use a search like this:

some_id | transaction startswith="Session closed" endswith="Session opened" maxpause=30m
to find sessions that had a break of at most 30 minutes.

The session_id I'm searching with is an extracted field. How would I go about finding the count of these transactions (closed -> opened) per session_id?

This is what I would like to get out:

session           connection_breaks
-----------------------------------
session1          1
session2          5
session3          2
0 Karma

somesoni2
Revered Legend

Try like this

some_id | transaction session_id startswith="Session closed" endswith="Session opened" maxpause=30m 
| stats count as connection_breaks by session_id
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...