Splunk Search

How to combine multiple complicated searches?

s0rbeto
Explorer

Hi everyone,

I have these 3 searches, and they are all complicated as it looks. Any idea on how to combine them? It's not something regular eval can do though, My thought is to put them into tables maybe?

index=websphere CPUStarvation
| rex "delay is\s+(?P<Value>\d+)\s+seconds" 
| eval Value=Value . " Seconds"
| eval AlertName = "APM WAS: CPU Starvation detected"
| eval Severity="Critical" 
| eval Details = "APM WAS: Error HMGR0152W. Value Field represent thread scheduling delay"
| table AlertName,Details,Severity,Value,host
| collect index=alerts sourcetype=Alerts:APM

index=websphere OutOfMemoryError 
| rex mode=sed field=_raw "s/\n.*//g" 
| rex mode=sed field=_raw "s/^\[.*PDT\]\s+.{8}\s+//g" 
| eval ts=round(_time,0) 
| stats count as Value list(_raw) as msg by ts,host 
| convert ctime(ts) as dt
| eval AlertName = "APM WAS: OutOfMemoryError"
| eval Severity="Critical" 
| eval Details = "OutOfMemoryError"
| table AlertName,Details,Severity,Value,host
| collect index=alerts sourcetype=Alerts:APM

index=websphere HangingThreat
| rex "active for\s+(?P<Value>\d+)\s+milliseconds.*are\s+(?P<threads>\d+)\s+thread" 
| eval Value=round(Value/1000,2)
| eval Value=Value . " Sec"
| eval AlertName = "APM WAS: WAS Hanging Threads"
| eval Severity="Critical" 
| eval Details = "APM WAS: Error WSVR0605W (".threads." Threads hang). Field 'Value' represent thread activity time"
| table AlertName,Details,Severity,Value,host
| collect index=alerts sourcetype=Alerts:APM

thank you

Tags (2)
0 Karma

NOUMSSI
Builder

Hi,
try this

| multisearch [search index=websphere CPUStarvation
 | rex "delay is\s+(?P<Value>\d+)\s+seconds" 
 | eval Value=Value . " Seconds"
 | eval AlertName = "APM WAS: CPU Starvation detected"
 | eval Severity="Critical" 
 | eval Details = "APM WAS: Error HMGR0152W. Value Field represent thread scheduling delay"
 | table AlertName,Details,Severity,Value,host
 | collect index=alerts sourcetype=Alerts:APM

]

[search index=websphere OutOfMemoryError 
 | rex mode=sed field=_raw "s/\n.*//g" 
 | rex mode=sed field=_raw "s/^\[.*PDT\]\s+.{8}\s+//g" 
 | eval ts=round(_time,0) 
 | stats count as Value list(_raw) as msg by ts,host 
 | convert ctime(ts) as dt
 | eval AlertName = "APM WAS: OutOfMemoryError"
 | eval Severity="Critical" 
 | eval Details = "OutOfMemoryError"
 | table AlertName,Details,Severity,Value,host
 | collect index=alerts sourcetype=Alerts:APM

]

[search index=websphere HangingThreat
 | rex "active for\s+(?P<Value>\d+)\s+milliseconds.*are\s+(?P<threads>\d+)\s+thread" 
 | eval Value=round(Value/1000,2)
 | eval Value=Value . " Sec"
 | eval AlertName = "APM WAS: WAS Hanging Threads"
 | eval Severity="Critical" 
 | eval Details = "APM WAS: Error WSVR0605W (".threads." Threads hang). Field 'Value' represent thread activity time"
 | table AlertName,Details,Severity,Value,host
 | collect index=alerts sourcetype=Alerts:APM

]

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...