<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to add a column showing search criteria that matched results? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424636#M121776</link>
    <description>&lt;P&gt;If you have the windows TA, the process command line field should be extracted automatically as the field Process_Command_Line. If not, you can use the rex command and group off of that. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...| rex field=_raw "Process Command Line: (?&amp;lt;Command_Line&amp;gt;[^\n]+)" | stats count by Command_Line
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 30 Sep 2020 02:41:59 GMT</pubDate>
    <dc:creator>begleyj1</dc:creator>
    <dc:date>2020-09-30T02:41:59Z</dc:date>
    <item>
      <title>How to add a column showing search criteria that matched results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424634#M121774</link>
      <description>&lt;P&gt;I'm writing a search to parse the command line arguments of 4688 events, and want to be able to sort by what matched in my search criteria. &lt;/P&gt;

&lt;P&gt;The arguments I'm searching for don't have a set order they appear in, so it's a mess to try and write regex to parse what the result hit on.&lt;/P&gt;

&lt;P&gt;Is there any way to add a column to the result table that shows what search criteria the result hit on?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 22:30:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424634#M121774</guid>
      <dc:creator>quadrant8</dc:creator>
      <dc:date>2019-08-01T22:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to add a column showing search criteria that matched results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424635#M121775</link>
      <description>&lt;P&gt;can you post your search and the search criteria you are using? &lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 00:18:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424635#M121775</guid>
      <dc:creator>nabeel652</dc:creator>
      <dc:date>2019-08-02T00:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to add a column showing search criteria that matched results?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424636#M121776</link>
      <description>&lt;P&gt;If you have the windows TA, the process command line field should be extracted automatically as the field Process_Command_Line. If not, you can use the rex command and group off of that. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...| rex field=_raw "Process Command Line: (?&amp;lt;Command_Line&amp;gt;[^\n]+)" | stats count by Command_Line
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:41:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-add-a-column-showing-search-criteria-that-matched-results/m-p/424636#M121776</guid>
      <dc:creator>begleyj1</dc:creator>
      <dc:date>2020-09-30T02:41:59Z</dc:date>
    </item>
  </channel>
</rss>

