I am beginner and i want to create something like this
my Splunk search1 is
index=XXX source="/opt/middleware/ibm/" findsachinattendance |timechart count span=60m | stats max(*) AS *
my Splunk search2 is
index=XXX source="/opt/middleware/ibm/" findtendulkarattendance |timechart count span=60m | stats max(*) AS *
I found something but i couldnt relate to work
While technically you indeed could append several searches and table them together in a way similar to this you linked to, you generally shouldn't.
Especially that you have almost identical searches which differ only by the one initial search term, which means that those searches might be relatively easy to aggregate into one.
So instead of "thinking non-splunky and trying to implement it in Splunk", tell us what problem you're trying to solve and we'll see if there is a "splunky" solution.
Splunk is pretty good at extracting information from log event, especially with regular expressions, so if you can show us sanitised versions of your log events and what it is you are try to achieve (as @PickleRick suggested), perhaps we can find a way forward for you.