Splunk Search

How to overlay two searches on the same graph?

mark_chuman
Path Finder

I have these two searches and am trying to figure out the best way to overlay them both on the same graph:

search 1

index=distributed sourcetype=vcenter_* "[Vdb::GetConnection] Failed to obtain connection" OR "SHUTDOWN is in progress." sourcetype=vcenter_vpxdlogs host=eivc2*vwin | timechart count by host

search 2

index=distributed sourcetype=vcenter_* sourcetype=vcenter_vpxdlogs "Starting VMware VirtualCenter" host=eivc2*vwin | timechart count by host

Thanks!

MuS
SplunkTrust
SplunkTrust

Hi mark.chuman,

take a look at this answer here http://answers.splunk.com/answers/129424/how-to-compare-fields-over-multiple-sourcetypes-without-joi... this will give you an idea how this could be done.

hope this helps ...

cheers, MuS

ChrisG
Splunk Employee
Splunk Employee

As MuS says (definitely check out the awesome answer he links to), the search is the key. On the visualization side, there are a couple of examples in the docs: Chart overlay

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...