Splunk Search

Combining searches

moosebas
New Member

I'm trying to combine multiple searches to get a count for each day, but it seems everything I do breaks the search in some way. The metrics I'm trying to combine have no direct relation to each other, and logs for each metric are different. As an example, I'm trying to get a total count for calls received, and a count for error codes generated, and then getting those two to display side by side on a bar chart to see a weeks worth by day

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

We need more information.  Let's start with the searches you want to combine.  Show them to us.  Hide sensitive information, if necessary.  Next, describe what the output should be.

Tell what you've tried and how each attempt failed.  Maybe you were close and an easy fix will get you going.  At the very least, we'll know not to suggest those things again.

---
If this reply helps you, Karma would be appreciated.
0 Karma

moosebas
New Member

The search I have so far that's gotten me close to my desired results is -- index=genesys "GIM - Significant Error Received>"| stats count | append [search No More Licenses | stats count ] --. The goal is to have a single chart that shows each error side by side on a day to day basis for an entire week in hopes of showing a non technical person "This is how many of each error we get on a Monday, this is how many of each we get on a Tuesday" sort of thing

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...