Splunk Search

Combine timechart in one chart by fields.

juanvarelagloba
Explorer

I have this query:

index=betas host="*433*" level=ERROR 
(source="*RequestUpg*" class="*RequestUpgEndPoint*") OR 
(source="*DisplayUpgPassengerItineraries*" class="*DisplayUpgPassengerItinerariesEndPoint*") OR 
(source="*ApiUpg*" 
    class="*GetCustomersService*" OR 
    class="*ItineraryService*" OR 
    class="*RequestUpgService*" OR 
    class="*GetCustomersController*" OR
    class="*AuthenticationServiceFilter*")

| timechart span=1d count by class

It does exactly what I want except it produces several charts:

alt text

I want it to produce one chart with this exact labels altogether in one chart, how should I approach it?

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Click the format button above the charts and toggle the multi-series mode.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Click the format button above the charts and toggle the multi-series mode.

juanvarelagloba
Explorer

I feel silly now 😕 Thanks a bunch!

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...