Dashboards & Visualizations

2 searches 2 sources one chart???

ashishv
Explorer

hello all,

i have 2 searches each with its own source, and i need to time chart that over 24 hrs in single chart? i cant figure out how to do that...

here are the searches: Search1: host="SOURCE1" PROCESSFLAG=SUCCESS| timechart span="1h" count by PROCESSFLAG

Search2: host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked" | timechart span="1h" count by ORDER_STATUS

Thanks Ashish

Tags (1)
0 Karma
1 Solution

David
Splunk Employee
Splunk Employee

I think the following should give you what you want.

host="SOURCE1" PROCESSFLAG=SUCCESS
   | timechart span="1h" count by PROCESSFLAG 
   | join _time 
     [search host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked"  
        | timechart span="1h" count by ORDER_STATUS
     ]

Let me know if that works out.

View solution in original post

0 Karma

David
Splunk Employee
Splunk Employee

I think the following should give you what you want.

host="SOURCE1" PROCESSFLAG=SUCCESS
   | timechart span="1h" count by PROCESSFLAG 
   | join _time 
     [search host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked"  
        | timechart span="1h" count by ORDER_STATUS
     ]

Let me know if that works out.

0 Karma

ashishv
Explorer

Wow this is cool..
thanks

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...