Splunk Search

error in timechart graph

ayushmaan
Explorer

Hi all,
We are having trouble regarding a query in which we need to display multiple metric_labels of a host in a single timechart. the query is as follows:

index="xyz"  source_host="host1" OR "host2" metric_label="metric_label1" OR "metric_label2"  OR "metric_label3 " OR "metric_label4" |dedup source_host _time | append [ search  index="abc" source="source.csv" ]  | timechart span=12h count(metric_value) as metric_value  count(number) as "No of tickets"

We need to pull the result of two searches in a single timechart. Urgently required inputs from you guys. Thanks a lot!

0 Karma

woodcock
Esteemed Legend

Try again. Post sample events and a mockup of your desired output. There is no possible way that we can help you with how little you have given us.

0 Karma

jawaharas
Motivator

This question needs clarification. Can you provide the expected output and also the error you are facing with current query?

First line of the SPL should be as below-
index="xyz" (source_host="host1" OR source_host="host2") (metric_label="metric_label1" OR metric_label="metric_label2" OR metric_label="metric_label3 " OR metric_label="metric_label4")

Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...