Splunk Search

How to filters results and convert rows to columns?

Splunk_321
Path Finder

I have a splunk query to get execution time of methods shown below

 

basesearch 
| where like(method,"A") OR like(method,"B")
| table method,time

 

 This will show execution time of method A and method B present in the same flow for multiple calls.

Results are something like below

 

method    time
A          110
B           95
A          120
A          110
B          101
A          110
B           95
A          125
A          115
B           80
B           85
B           90

 

I want to filter results such that execution time of A>=110 and corresponding execution time of B 

something like below

 

A         B
110       85
120      101
110       95
125      100
115       95

 

 

Labels (1)
Tags (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

 

| where (method=="A" AND time >= 110) OR method=="B"
| eval row=1
| chart list(time) as time by row method
| fields - row

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...