Splunk Search

error in timechart graph

ayushmaan
Explorer

Hi all,
We are having trouble regarding a query in which we need to display multiple metric_labels of a host in a single timechart. the query is as follows:

index="xyz"  source_host="host1" OR "host2" metric_label="metric_label1" OR "metric_label2"  OR "metric_label3 " OR "metric_label4" |dedup source_host _time | append [ search  index="abc" source="source.csv" ]  | timechart span=12h count(metric_value) as metric_value  count(number) as "No of tickets"

We need to pull the result of two searches in a single timechart. Urgently required inputs from you guys. Thanks a lot!

0 Karma

woodcock
Esteemed Legend

Try again. Post sample events and a mockup of your desired output. There is no possible way that we can help you with how little you have given us.

0 Karma

jawaharas
Motivator

This question needs clarification. Can you provide the expected output and also the error you are facing with current query?

First line of the SPL should be as below-
index="xyz" (source_host="host1" OR source_host="host2") (metric_label="metric_label1" OR metric_label="metric_label2" OR metric_label="metric_label3 " OR metric_label="metric_label4")

Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...