Splunk Search

join in search string

Splunk_U
Path Finder

I have a search string

index=os source=vmstat
| multikv fields memUsedPct memTotalMB memFreeMB
| stats avg(memUsedPct) as avgMemPct max(memUsedPct) as peakMemPct avg(memUsedMB) as avgMemMb max(memUsedMB) as peakMemMb by host
| join host [ search index=os source=cpu
| multikv fields pctIdle

| search all

| eval Percent_CPU_Load = 100 - pctIdle

| stats avg(Percent_CPU_Load) as avgCpuPct max(Percent_CPU_Load) as peakCpuPct by host

Now is there any way that I can get the same result without doing join??

Tags (1)
0 Karma

cramasta
Builder

How does this work?

index=os AND ( source=cpu OR source=vmstat) | multikv fields memUsedPct memTotalMB memFreeMB pctIdle | eval Percent_CPU_Load = 100 - pctIdle | stats avg(memUsedPct) as avgMemPct max(memUsedPct) as peakMemPct avg(memUsedMB) as avgMemMb max(memUsedMB) as peakMemMb avg(Percent_CPU_Load) as avgCpuPct max(Percent_CPU_Load) as peakCpuPct by host

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...