It seems you have extra information (the par value which is repeated with every event). In a context of analyziing single event it's good because it lets you do a quick check without consulting any external sources (splunk is not an RDBMS so we won't teach you about database normalization here ;-)). But seriously - what if the par value changed over time? Anyway, it seems that what you need is an xyseries command which takes such "indexed" events and puts them over a table. The trick here is that xyseries normally works with three fields - X-index, Y-index and value whereas in your events you have par and target which should be the "Y-index". So you'd need to combine them into one value, then do xyseries and then split them again into separate values. Anyway, just out of curiosity - why do you have multiple indexes with the same kind of data?
... View more