Dashboards & Visualizations

2 searches 2 sources one chart???

ashishv
Explorer

hello all,

i have 2 searches each with its own source, and i need to time chart that over 24 hrs in single chart? i cant figure out how to do that...

here are the searches: Search1: host="SOURCE1" PROCESSFLAG=SUCCESS| timechart span="1h" count by PROCESSFLAG

Search2: host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked" | timechart span="1h" count by ORDER_STATUS

Thanks Ashish

Tags (1)
0 Karma
1 Solution

David
Splunk Employee
Splunk Employee

I think the following should give you what you want.

host="SOURCE1" PROCESSFLAG=SUCCESS
   | timechart span="1h" count by PROCESSFLAG 
   | join _time 
     [search host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked"  
        | timechart span="1h" count by ORDER_STATUS
     ]

Let me know if that works out.

View solution in original post

0 Karma

David
Splunk Employee
Splunk Employee

I think the following should give you what you want.

host="SOURCE1" PROCESSFLAG=SUCCESS
   | timechart span="1h" count by PROCESSFLAG 
   | join _time 
     [search host="SOURCE2" NOT ORDER_STATUS ORDER_STATUS="Entered" OR ORDER_STATUS="Booked"  
        | timechart span="1h" count by ORDER_STATUS
     ]

Let me know if that works out.

0 Karma

ashishv
Explorer

Wow this is cool..
thanks

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...