Splunk Search

Combine timechart in one chart by fields.

juanvarelagloba
Explorer

I have this query:

index=betas host="*433*" level=ERROR 
(source="*RequestUpg*" class="*RequestUpgEndPoint*") OR 
(source="*DisplayUpgPassengerItineraries*" class="*DisplayUpgPassengerItinerariesEndPoint*") OR 
(source="*ApiUpg*" 
    class="*GetCustomersService*" OR 
    class="*ItineraryService*" OR 
    class="*RequestUpgService*" OR 
    class="*GetCustomersController*" OR
    class="*AuthenticationServiceFilter*")

| timechart span=1d count by class

It does exactly what I want except it produces several charts:

alt text

I want it to produce one chart with this exact labels altogether in one chart, how should I approach it?

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Click the format button above the charts and toggle the multi-series mode.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Click the format button above the charts and toggle the multi-series mode.

juanvarelagloba
Explorer

I feel silly now 😕 Thanks a bunch!

0 Karma
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...