Splunk Search

How to include 2 search in one results?

leznx
Engager

Hi,

I have one problem here.

I need to create a search with 2 groups, and create a chart with result.

Example, my search :

index=inc_ group="Ti" OR group="Support" OR group="admin" OR group="helpdesk" | stats count(eval(match(group,"TI,Support"))) AS Operation , count(eval(match(Grupo,"admin,helpdesk"))) AS Administrative

How create a graph with this query?

I try using | timechart count by Operation|Administrative but i not have success

Help 😞

Tags (3)
0 Karma
1 Solution

splunk68
Path Finder

You can split your search in 2 searches and append them together. Try something like that (after correcting your typos):

index=inc_ group="Ti" OR group="Support" OR group="admin" OR group="helpdesk" | stats count(eval(match(group,"TI,Support"))) AS "Operation" by _time | append [search index=inc_ group="admin" OR group="helpdesk" | stats count(eval(match(group,"admin,helpdesk"))) AS "Administrative" by _time] | stats values("Operation"), values("Administrative") by _time

View solution in original post

linu1988
Champion

So did the search gave you the result?

|Timechart Operation,Administrative

0 Karma

leznx
Engager

Sorry linu1988!

It's a error in my digitation

The search is:

count(eval(match(group,"TI,Support"))) AS Operation , count(eval(match(group,"admin,helpdesk"))) AS Administrative

0 Karma

splunk68
Path Finder

You can split your search in 2 searches and append them together. Try something like that (after correcting your typos):

index=inc_ group="Ti" OR group="Support" OR group="admin" OR group="helpdesk" | stats count(eval(match(group,"TI,Support"))) AS "Operation" by _time | append [search index=inc_ group="admin" OR group="helpdesk" | stats count(eval(match(group,"admin,helpdesk"))) AS "Administrative" by _time] | stats values("Operation"), values("Administrative") by _time

splunk68
Path Finder

I can't test it right now, but if you remove "by _time" everywhere in the search, it should give you the count for Operation and the count Administrative, so that you just have to create a report and select pie chart.

0 Karma

leznx
Engager

Thx bro! Perfect!!

I have one more question about this topic, how to add values in one pie graph? It's possible? Ex : Operation vs Administrative

0 Karma

linu1988
Champion

count(eval(match(Grupo,"admin,helpdesk"))) in the part

"Grupo" is a field or a typo error in the search?

And i suppose Operation/Administrative are fields!!! You should put |Timrchart Operation,Administrative

0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...