In data analysis and visualization, Splunk stands out as a powerful tool for turning raw data into actionable insights. One feature that make Splunk such a versatile platform is its ability to transform and present data efficiently. In this technical blog, let’s look into the Splunk table command – a fundamental building block for creating structured and organized tables from your raw event data.

Understanding the Basics:

The table command in Splunk is used to format search results into tabular output. This permits users to select specific fields and arrange them in a structured manner that facilitates easy reading and understanding. The basic syntax for the table command is as follows:

... | table field1, field2, field3, ...

Now, in order to use the features of the table command, you first have to create a table with code. Let’s look at a basic overview of how to do so:

How to generate a table?

Write a search that contains a transforming command in order to produce a table. To view and format the table, conduct a search from the Search page and choose the Statistics tab.

To modify the arrangement of table columns or to specify which fields are included in the table, use the table command in a search.

Some examples of Search:

Transforming search:

For this search, the chart transforming command is used-

index = _internal | chart avg(bytes) over sourcetype

and ends up generating a table with two columns

Transforming search with the table command:

A table with action, host, and count columns in generated in this search

index = _internal | stats count by action, host

The table command can be added to this search in order to change the columns that appear in the table or to change column order. For example, to generate a table with only the host and count columns, add | table host count.

Key features and functionalities:

Field selection:

-  The primary function of the table command is to select and display specific fields from your search results. This can help simplify complex data sets and focus on the information that is most relevant to your analysis.


   index=your_index sourcetype=your_sourcetype | table timestamp, user, action

Custom column names:

- You can use the AS keyword to assign custom names to the columns in your table. This is particularly useful when you want to enhance the clarity of your output.


   index=your_index sourcetype=your_sourcetype | table timestamp AS "Event Time", user AS "Username", action AS "Action Performed"


 - The table command allows you to sort your results based on one or more fields. This is essential for better analysis and identifying trends within your data.


   index=your_index sourcetype=your_sourcetype | table timestamp, user, action | sort -timestamp

Conditional formatting:

- By using conditional formatting with the eval command, you can add a new field to your table based on certain conditions. This enhances the flexibility of your data presentation.


   index=your_index sourcetype=your_sourcetype | eval status=if(response_code=200, "Success", "Failure") | table timestamp, user, action, status

Data aggregation:

- The table command can also be combined with statistical and aggregation commands to present summarized information. This is particularly useful when dealing with large datasets.


   index=your_index sourcetype=your_sourcetype | stats count BY user | table user, count

Best practices:

Select only what you need:

Limit the number of fields in your table to only those necessary for your analysis. This enhances performance and reduces visual clutter.

Use custom column names:

Assign meaningful names to your columns using the AS keyword to improve the interpretability of your tables.

Combine with other commands:

Experiment with combining the table command with other Splunk commands to unlock advanced data manipulation and presentation capabilities.


The Splunk table command is a versatile tool for transforming raw data into organized and meaningful tables. By leveraging its features, you can streamline your data analysis process, enhance visualization, and extract valuable insights from your datasets. Mastering the table command is an essential step towards becoming proficient in Splunk data manipulation and presentation.

About Positka:

Being a Splunk Singapore partner, Positka specializes in high-end technology solutions to help businesses improve their overall IT infrastructure. Founded in 2014, our services include Splunk Services, Cybersecurity & Risk Management, Security Awareness Training, Managed Security Services, Lean Process Optimization, Robotic Process Enablement Services and Solutions, while partnering with other top-tier companies like SentinelOne and so on. We are headquartered in Singapore and operate across India, the US, and the UK as well.

This author is a tech writer in Positka writing amazing blogs on latest smart security tech.

Get in touch

Send us a Message

Looking for general information or have a specific question. Fill the form below or drop
us a line at susan@positka.com.