Splunk Search

How to save search results to KV store?

pragadeesh
New Member

I have a simple search:

index =abc OR index =xxx |transaction DIGEST | eval match_count=mvcount(sourcetype) | eval Digest_MATCH=if(match_count==2,"MATCH","MISSING") | table _time, DIGEST, Digest_MATCH, sourcetype

I want store all rows where digest_match = missing into KV store and lookup values to see if there any matches for missing values in future searches.

0 Karma

sundareshr
Legend

Here is a great posting on this subject

http://dev.splunk.com/view/webframework-developapps/SP-CAAAEZH

jluo_splunk
Splunk Employee
Splunk Employee

Hi Pragadeesh,

You'll need to use the outputlookup command to push those results into a lookup. From there, you can convert your lookup table to a KV Store.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...