Splunk Search

How to join events for conditional statements

josefa123
Explorer

I have a DeviceA that I am monitoring. There are cpu and ram. Metrics are on different event (cpu has its own event and also RAM). how can I put it in a where clause. For example | where cpu_load < 50 and Ram <50. If I run the search with | table cpu_load RAM_load it displays two event with one value at the cpu and one value at RAM. how can I combine it in just one record or event? Thanks

0 Karma

woodcock
Esteemed Legend

You can do this (Note that it is AND, not and😞

 | where cpu_load < 50 AND Ram < 50

Also:

table cpu_load RAM_load | stats first * AS *
0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...