I have multiple searches, with almost the same search commands and only one of the variables are different for each search. It is too tedious to run the searches tens of times by changing the variable every time. I know that app could manage that, but I am using Splunk Free. Is there any way to simplify this process? Thanks!
Create a list of those variables (potentially from another search or even a lookup file for ease of modification using an APP) and then run the searches via a map command.
This way you can have the same search run over and over with just different variables.
Map command - https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Map
Cut & Paste Example :
| eventcount summarize=false index=*
| map maxsearches=1000 search="| metadata type=sourcetypes index=\"$index$\" splunk_server=\"$server$\" | eval index=\"$index$\" | eval server=\"$server$\" "
| fields index server sourcetype totalCount | stats sum(totalCount) AS eventCount by index, sourcetype
Note that the internal search is surrounded by quotes of its own! The variables are surrounded by single dollar signs on either side.