Splunk Search

Combining searches

moosebas
New Member

I'm trying to combine multiple searches to get a count for each day, but it seems everything I do breaks the search in some way. The metrics I'm trying to combine have no direct relation to each other, and logs for each metric are different. As an example, I'm trying to get a total count for calls received, and a count for error codes generated, and then getting those two to display side by side on a bar chart to see a weeks worth by day

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

We need more information.  Let's start with the searches you want to combine.  Show them to us.  Hide sensitive information, if necessary.  Next, describe what the output should be.

Tell what you've tried and how each attempt failed.  Maybe you were close and an easy fix will get you going.  At the very least, we'll know not to suggest those things again.

---
If this reply helps you, Karma would be appreciated.
0 Karma

moosebas
New Member

The search I have so far that's gotten me close to my desired results is -- index=genesys "GIM - Significant Error Received>"| stats count | append [search No More Licenses | stats count ] --. The goal is to have a single chart that shows each error side by side on a day to day basis for an entire week in hopes of showing a non technical person "This is how many of each error we get on a Monday, this is how many of each we get on a Tuesday" sort of thing

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...