Splunk Search

Splitting results by matched conditions

mahesh27
Communicator

|tstats count where index=app-data  (TERM(Errors) TERM( Started) TERM( in)  TERM(*s)  TERM(*ms))  OR (TERM(system)  TERM(restart))

when i run the above query i am getting overall(combined) results. but i want to see the results for each and every string  separately which i mentioned in the query.

how can i do that????

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

You can't do that. Splunk doesn't keep track of which part of the condition was matched on a particular result line. And you can only split your aggregation on a field or prefixed value.

0 Karma

mahesh27
Communicator

Ok if that is a case we can do without tstats using eval command

May I know how can I do that

 

 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

I don't quite follow, to be honest.

Of course you could go through a list of terms to match  over event by event and set a field in case it matched but it will be way way way worse performance-wise.

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...