index=b2b_os host=* sourcetype=top pctMEM=*| transaction host _time | streamstats window=1 global=f sum(pctMEM) as MEM | table host MEM |top | dedup host
Try this (untested) search which I think may be closer to what you need:
index=b2b_os sourcetype=top pctMEM=*| streamstats sum(pctMEM) as Mem |top 5 Mem | table host Mem
thank you .. it's working good now .. Just one more small ask ..
I need to add if the Mem >= 10 % then turn green and if it's >=50& turn yellow and if it's 90% turn red ..
You can use rangemap to set the target colours for a given result, but this wont colour a table for you (you would need to modify the CSS for that) but if your using charts, this should set the colours as per your definitions
...| rangemap field=Mem green=0-49 yellow=50-89 default=red|...
http://docs.splunk.com/Documentation/Splunk/7.0.1/SearchReference/Rangemap
Hi jampar12,
please provide us with some sample events and also your pctMEM=
at the beginning of your search has no value assigned, as well as the host-field
Also |transaction
with _time
will only group events which share the same exact timestamp - probably not what you want.
Also I presume you mean memory use, rather than high CPU?