Splunk Search

Combining searches

moosebas
New Member

I'm trying to combine multiple searches to get a count for each day, but it seems everything I do breaks the search in some way. The metrics I'm trying to combine have no direct relation to each other, and logs for each metric are different. As an example, I'm trying to get a total count for calls received, and a count for error codes generated, and then getting those two to display side by side on a bar chart to see a weeks worth by day

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

We need more information.  Let's start with the searches you want to combine.  Show them to us.  Hide sensitive information, if necessary.  Next, describe what the output should be.

Tell what you've tried and how each attempt failed.  Maybe you were close and an easy fix will get you going.  At the very least, we'll know not to suggest those things again.

---
If this reply helps you, Karma would be appreciated.
0 Karma

moosebas
New Member

The search I have so far that's gotten me close to my desired results is -- index=genesys "GIM - Significant Error Received>"| stats count | append [search No More Licenses | stats count ] --. The goal is to have a single chart that shows each error side by side on a day to day basis for an entire week in hopes of showing a non technical person "This is how many of each error we get on a Monday, this is how many of each we get on a Tuesday" sort of thing

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...