Splunk Search

Timechart in the same table based on column

archananaveen
Explorer

Hi,

I have the below 2 searches, which work fine. I need to put the output of both the searches in a single table so the whole data is displayed over ClusterName. Please let me know how I can achieve this.

sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName |

clusterName=xxx | timechart span=1m count by eventtype | eval count = ceiling(count/16)
0 Karma

HiroshiSatoh
Champion

Is it like this?
※I do not consider performance etc.

 sourcetype = aaa_sss* eventtype=* | chart values(eventtype) AS Events over clusterName 
|map search="search clusterName=$clusterName$
|eval eventtype=\"$eventtype$\"|timechart span=1m count by eventtype|eval clusterName=\"$clusterName$\""
0 Karma

somesoni2
Revered Legend

What the expected (sample) resulting table? (what columns? show some sample values)

0 Karma
Get Updates on the Splunk Community!

The Payment Operations Wake-Up Call: Why Financial Institutions Can't Afford ...

The same scenario plays out across financial institutions daily. A payment system fails at 11:30 AM on a busy ...

Make Your Case: A Ready-to-Send Letter for Getting Approval to Attend .conf25

Hello Splunkers, Want to attend .conf25 in Boston this year but not sure how to convince your manager? We've ...

Community Spotlight: A Splunk Expert's Journey

In the world of data analytics, some journeys leave a lasting impact not only on the individual but on the ...