Splunk Search Commands

The Splunk Commands are one of the programming commands which make your search processing simple with the subset of language by the Splunk Enterprise commands. These commands are used to transform the values of the specified cell into numeric values. The following are the listed Splunk Search commands that are sorted according to the various categories


 Splunk Search Commands - Table of Content

Splunk Search Commands Correlation

These are one of the commands which can be used for the purpose of building the correlation searches

Append: It is described as one of the Appends which shows the sub-search results to present results.

Appendcols: This command shows all the fields of sub-search results to the present results like first to first and last to last soon.


Want to become a Splunk Certified Specialist? Visit here to Learn Splunk Online Course

Appendpipe: This command is completely used to generate the results in sub-search, which is applied to the current result that is set to the previous one.

Rules: This command will easily find all the association rules in between the field values.

Associate: This command is used to identify the correlations between fields.

Contingency, Constable, stable: This command helps to build a contingency table for a particular two fields.

Correlate: This is the top correlation command which can easily calculate the relation between the different fields.

Diff: This command shows the complete outputs between two search results.

Join: This command will help to combine all the results from the main pipeline results through sub-search.

Lookup: It can be used to explicitly all invokes in the field value lookups.

Self-join: This command shows the join results with itself without depending on other commands.

Set: It is used to perform multiple sets of operations like intersect, union, and diff, especially on the sub-searches.

Stats: This command is used to complete all the statistics that are grouped optionally by the fields.

Transaction: By using this command all the groups of the search results are into the group of transactions.

Related Page: Splunk Software

Data and indexes

Data and Indexes are one of the categories in the Splunk search commands which are used to learn all the data that can be added, deleted or manage the data from the resources that are placed in the summary indexes.

 MindMajix YouTube Channel

View and manage Data

All the view and manage data commands will help to return the relevant information regarding the data that contains in your indexes. The data present in the indexes cannot be modified easily. The following are some of the commands which are used to delete and add specific data from your indexes.

Audit: This data command will be helpful to throw back all the basic information that can be stored in the local audit index.

Data model: This command is used to provide all the relevant information regarding the data model object or data model.

Dbinspect: It is used to return all the specific information, particularly about the specific index.

Event count: This command is used to connect with the number of events in the index.

Metadata: This command is used to return all the sources list, and types of sources as well as hosts in the specified index.

Typeahead: This command is helpful to return all the typeahead information in the specified prefix.

Delete: This command is used to delete all the specific events or search results to delete from the index.

Input: This delete in Splunk search commands will help to add or disable sources in the indexes

Visit here to know Splunk Careers

Managing the summary indexes

These commands in Splunk search commands are helpful to create and manage all the summary indexes.

Collect, stash: This command is used to provide all the search results into a summary index.

Overlap: It is used to find all the events in the summary index that you have missed.

Sichart: This command is used to calculate the summary index of the chart.

Sirare: It can be helpful to conclude the summary indexing version of rare.

Stats: This command will be helpful to summarize the stats version.

Related Article: Splunk Dashboard

Modify fields and field values

This type of command will help to modify all the fields and the value.

Convert: It helps to convert all the numerical values in the field.

Fill down: This command is used to replace all the null values with the last non-null values.

Fillnull: It is used to change all the null values with a particular value.

Makemv: If you want to change the specified field in the index then use this command while researching.

Nomv: This command is used to change the particular multivalve field to a single value field during the search.

Rename: This is helpful to rename the specified value by using the wildcards in the specific multiple fields.

Visit here to know about Splunk Timechart

Geographic and location:

This Splunk geographical command is used to search all the results

Geom: This command is used to add the field to every event that contains geographic structures in the map visually. But this command requires the external loops to get installed.

Geomfilter: This command will accept the specific bounding box in the maps which points to the respective filtered out.

Geostats: It helps to generate all the statistics that are clustered into geographical bins which are particularly rendered on the whole world map.?


The metrics in Splunk search commands will completely work with all the metrics data without any hassle.

Mcollect: This command is used to translate all the events in the form of metric data points and can be successfully inserted into the data points of the search head.

Even collect: It is used to convert the stats of events into metric points by inserting them into the metric index.

Mstats: It helps to calculate all the visualization of the data through metric names dimension fields in the respective indexes.

Prediction and trending:

The prediction and trending commands of Splunk are helping to detect all the values that create great visualizations.

Predict: This command is used to enable all algorithm series that predict the values of fields.

Trendline: It is used to calculate and compute all the averages in the fields

X11: This command completely enables the trend with respect to your data by deleting all the seasonal patterns.

Also Read - Splunk Interview Questions


Time is one of the categories in the Splunk search commands which is used to search on the basis of time ranges which can add more information to your programs.

Gentimes: This command is used to return all the respective results by matching the time range.

Localize: It is used to return the list of the time ranges among the time range along with the search results.

Realtime: This command is used to differentiate the difference between the human-readable times to which adds more value to the fields in the search results.

Explore Splunk Sample Resumes!' Download & Edit, Get Noticed by Top Employers!

Course Schedule
Splunk TrainingJun 22 to Jul 07View Details
Splunk TrainingJun 25 to Jul 10View Details
Splunk TrainingJun 29 to Jul 14View Details
Splunk TrainingJul 02 to Jul 17View Details
Last updated: 23 Feb 2024
About Author


Madhuri is a Senior Content Creator at MindMajix. She has written about a range of different topics on various technologies, which include, Splunk, Tensorflow, Selenium, and CEH. She spends most of her time researching on technology, and startups. Connect with her via LinkedIn and Twitter .

read less