Splunk Search

How do I chart 2 searches on one chart?

afamoyib
Path Finder

Searches

index=nix sourcetype=cpu host="host a"  CPU="all" | eval Percent_CPU_Load = 100 - pctIdle | timechart limit=0 max(Percent_CPU_Load) by host

index=nix source=vmstat sourcetype=vmstat tag=memory host="host a"  | timechart limit=0 max(memUsedPct) by host
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Here is a simpler example of how this might work:
index=* | timechart count by source | append [search index=* | timechart count by sourcetype]

For your search this might work:

index=nix sourcetype=cpu host="host a" CPU="all" | eval Percent_CPU_Load = 100 - pctIdle | timechart limit=0 max(Percent_CPU_Load) by host | append [search index=nix source=vmstat sourcetype=vmstat tag=memory host="host a" | timechart limit=0 max(memUsedPct) by host]
0 Karma

afamoyib
Path Finder

It does not seem to work. It is displaying 3 charts instead of 2

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Are you able to upload a picture so I can see what it looks like?
Thanks

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...