Splunk Search

Timechart in the same table based on column

archananaveen
Explorer

Hi,

I have the below 2 searches, which work fine. I need to put the output of both the searches in a single table so the whole data is displayed over ClusterName. Please let me know how I can achieve this.

sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName |

clusterName=xxx | timechart span=1m count by eventtype | eval count = ceiling(count/16)
0 Karma

HiroshiSatoh
Champion

Is it like this?
※I do not consider performance etc.

 sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName 
|map search="search clusterName=$clusterName$
|eval eventtype=\"$eventtype$\"|timechart span=1m count by eventtype|eval clusterName=\"$clusterName$\""
0 Karma

somesoni2
Revered Legend

What the expected (sample) resulting table? (what columns? show some sample values)

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...