Splunk Search

tstats search that I can group over time for each of my indexes

bzsplunk54
New Member

Hello ,
I'm looking for assistance with an SPL search utilizing the tstats command that I can group over a specified amount of time for each of my indexes

I have this command to view the entire ingestion but how can I parse it to show each index?

| tstats count where sourcetype=* by _time span=1d

thank you

Tags (3)
0 Karma
1 Solution

chrisyounger
SplunkTrust
SplunkTrust

Try this: | tstats count where sourcetype=* by index _time span=1d | timechart sum(count) by index

View solution in original post

0 Karma

chrisyounger
SplunkTrust
SplunkTrust

Try this: | tstats count where sourcetype=* by index _time span=1d | timechart sum(count) by index

0 Karma

bzsplunk54
New Member

that is complete awesomeness ! thank you....

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...