Splunk Search

error in timechart graph

ayushmaan
Explorer

Hi all,
We are having trouble regarding a query in which we need to display multiple metric_labels of a host in a single timechart. the query is as follows:

index="xyz"  source_host="host1" OR "host2" metric_label="metric_label1" OR "metric_label2"  OR "metric_label3 " OR "metric_label4" |dedup source_host _time | append [ search  index="abc" source="source.csv" ]  | timechart span=12h count(metric_value) as metric_value  count(number) as "No of tickets"

We need to pull the result of two searches in a single timechart. Urgently required inputs from you guys. Thanks a lot!

0 Karma

woodcock
Esteemed Legend

Try again. Post sample events and a mockup of your desired output. There is no possible way that we can help you with how little you have given us.

0 Karma

jawaharas
Motivator

This question needs clarification. Can you provide the expected output and also the error you are facing with current query?

First line of the SPL should be as below-
index="xyz" (source_host="host1" OR source_host="host2") (metric_label="metric_label1" OR metric_label="metric_label2" OR metric_label="metric_label3 " OR metric_label="metric_label4")

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...