Splunk Search

Timechart in the same table based on column

archananaveen
Explorer

Hi,

I have the below 2 searches, which work fine. I need to put the output of both the searches in a single table so the whole data is displayed over ClusterName. Please let me know how I can achieve this.

sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName |

clusterName=xxx | timechart span=1m count by eventtype | eval count = ceiling(count/16)
0 Karma

HiroshiSatoh
Champion

Is it like this?
※I do not consider performance etc.

 sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName 
|map search="search clusterName=$clusterName$
|eval eventtype=\"$eventtype$\"|timechart span=1m count by eventtype|eval clusterName=\"$clusterName$\""
0 Karma

somesoni2
SplunkTrust
SplunkTrust

What the expected (sample) resulting table? (what columns? show some sample values)

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...