<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to split search results into separate lines instead of concatenating? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466184#M131269</link>
    <description>&lt;P&gt;Try combining &lt;CODE&gt;tstats&lt;/CODE&gt; with &lt;CODE&gt;timechart&lt;/CODE&gt;.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats summariesonly=t prestats=t count from datamodel=XZY WHERE field_ip="192.168.101" OR field_ip="192.168.102" OR field_ip="192.168.103" OR field_ip="192.168.104" OR field_ip="192.168.105" by _time, field_ip
| timechart count by field_ip
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 28 May 2020 13:20:21 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-05-28T13:20:21Z</dc:date>
    <item>
      <title>How to split search results into separate lines instead of concatenating?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466183#M131268</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;I did a search like this:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;|  tstats summariesonly=t count from datamodel=XZY WHERE  field_ip="192.168.101" OR field_ip="192.168.102" OR field_ip="192.168.103" OR field_ip="192.168.104" OR field_ip="192.168.105"  by field_ip, _time
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;But this shows me just one line and concatenates the single field values (the different IPs) after another... so the first "quarter of the line is the first IP the next quarter is the next IP also.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/8998i1A2912D22996B22A/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;When I do the same search with the following:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;| datamodel XZY search | search field_ip="192.168.101" OR field_ip="192.168.102" OR field_ip="192.168.103" OR field_ip="192.168.104" OR field_ip="192.168.105" | timechart count by field_ip
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;It does split the &lt;CODE&gt;field_ip&lt;/CODE&gt; into its values and shows me 4 lines. One for each IP.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/8999i8071A0B06929C836/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Due to performance issues, I would like to use the &lt;CODE&gt;tstats&lt;/CODE&gt; command.&lt;/P&gt;
&lt;P&gt;(I have the same issue when using the &lt;CODE&gt;stats&lt;/CODE&gt; command instead of the &lt;CODE&gt;timechart&lt;/CODE&gt; command)&lt;/P&gt;
&lt;P&gt;So I guess there is something like a parameter I must give the &lt;CODE&gt;stats&lt;/CODE&gt; command to split the result in different lines instead of concatenating the results.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 19:20:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466183#M131268</guid>
      <dc:creator>qman</dc:creator>
      <dc:date>2020-06-08T19:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to split search results into separate lines instead of concatenating?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466184#M131269</link>
      <description>&lt;P&gt;Try combining &lt;CODE&gt;tstats&lt;/CODE&gt; with &lt;CODE&gt;timechart&lt;/CODE&gt;.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats summariesonly=t prestats=t count from datamodel=XZY WHERE field_ip="192.168.101" OR field_ip="192.168.102" OR field_ip="192.168.103" OR field_ip="192.168.104" OR field_ip="192.168.105" by _time, field_ip
| timechart count by field_ip
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 28 May 2020 13:20:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466184#M131269</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-28T13:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to split search results into separate lines instead of concatenating?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466185#M131270</link>
      <description>&lt;P&gt;first of all: Ups! I just noticed I missed an octet in the IP addressas... please imagine them like 192.168.1.10x&lt;/P&gt;

&lt;P&gt;unfortunately this doesn't work as intended. When I do this it counts only the appearence of the field_ip value.&lt;/P&gt;

&lt;P&gt;So for example if at time 11:30 192.168.1.103 has 400 counts, with the above query timechart shows me at 11:30 a value of 1 for 192.168.1.103...&lt;/P&gt;

&lt;P&gt;The result I get is this:&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/8997iDDE7D34DA91EB8C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 14:06:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466185#M131270</guid>
      <dc:creator>qman</dc:creator>
      <dc:date>2020-05-28T14:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to split search results into separate lines instead of concatenating?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466186#M131271</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| tstats summariesonly=t count from datamodel=XZY WHERE field_ip="192.168.101" OR field_ip="192.168.102" OR field_ip="192.168.103" OR field_ip="192.168.104" OR field_ip="192.168.105" by _time, field_ip
| xyseries _time field_ip count
| fillnull "192.168.101" "192.168.102" "192.168.103" "192.168.104" "192.168.105"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm not sure about the span. so, I make this query. how about this?&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 21:07:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-split-search-results-into-separate-lines-instead-of/m-p/466186#M131271</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-05-28T21:07:39Z</dc:date>
    </item>
  </channel>
</rss>

