Splunk Search

How do I chart 2 searches on one chart?

afamoyib
Path Finder

Searches

index=nix sourcetype=cpu host="host a"  CPU="all" | eval Percent_CPU_Load = 100 - pctIdle | timechart limit=0 max(Percent_CPU_Load) by host

index=nix source=vmstat sourcetype=vmstat tag=memory host="host a"  | timechart limit=0 max(memUsedPct) by host
0 Karma

livehybrid
Super Champion

Here is a simpler example of how this might work:
index=* | timechart count by source | append [search index=* | timechart count by sourcetype]

For your search this might work:

index=nix sourcetype=cpu host="host a" CPU="all" | eval Percent_CPU_Load = 100 - pctIdle | timechart limit=0 max(Percent_CPU_Load) by host | append [search index=nix source=vmstat sourcetype=vmstat tag=memory host="host a" | timechart limit=0 max(memUsedPct) by host]
0 Karma

afamoyib
Path Finder

It does not seem to work. It is displaying 3 charts instead of 2

0 Karma

livehybrid
Super Champion

Are you able to upload a picture so I can see what it looks like?
Thanks

0 Karma
Get Updates on the Splunk Community!

AppDynamics Summer Webinars

This summer, our mighty AppDynamics team is cooking up some delicious content on YouTube Live to satiate your ...

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...