<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Its Urgent - Request for Dashboard Panel in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Its-Urgent-Request-for-Dashboard-Panel/m-p/703694#M20718</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273798"&gt;@santoshpatil01&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Your request is lacking useful information for anyone to help. It is not clear the query format that will serve as your base search so maybe you'll have to adjust that to your reality.&lt;BR /&gt;&lt;BR /&gt;Basically you'll need to have a base query that returns all raw data for the tokens wherever they are, and then you create the panels accordingly.&lt;BR /&gt;If you don't have the input fields to set the tokens, you'll need to set them as well on each panel OR in the dashboard header depending on the filter active necessity.&lt;/P&gt;
&lt;P&gt;In each panel, mention the base search making this a linked search, and use as query something like this:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Total request number for security token/priority token filtered by partner name&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.partner$
| stats count as "Total Requests" by security_token, priority_token&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Duplicate request number filtered by partner name and customer ID (to check if current expiration time for both tokens are appropriate)&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.parner$ AND customerId=$token.customerId$
| stats count by parner, customerId
| where count&amp;gt;1&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Priority token usage filtered by partner name&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.parner$
| stats count by token_name&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Response time analysis for security token/priority token&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| stats avg(response_time) as response_time by security_token, priority_token&lt;/LI-CODE&gt;
&lt;P&gt;Or if you need 90th percentile instead:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| stats p90(response_time) as response_time by security_token, priority_token
&lt;/LI-CODE&gt;
&lt;P&gt;Again, this is just a scratch in the surface as I don't know your query, field names and additional information, but it should be enough for you to kick this off and play around.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Nov 2024 15:47:11 GMT</pubDate>
    <dc:creator>victor_menezes</dc:creator>
    <dc:date>2024-11-06T15:47:11Z</dc:date>
    <item>
      <title>Its Urgent - Request for Dashboard Panel</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Its-Urgent-Request-for-Dashboard-Panel/m-p/703658#M20713</link>
      <description>&lt;P&gt;In Splunk Dashboard:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;Total request number for security token/priority token filtered by partner name&lt;/LI&gt;&lt;LI&gt;Duplicate request number filtered by partner name and customer ID (to check if current expiration time for both tokens are appropriate)&lt;/LI&gt;&lt;LI&gt;Priority token usage filtered by partner name&lt;/LI&gt;&lt;LI&gt;Response time analysis for security token/priority token&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to createádd panel for this 4 options&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 12:58:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Its-Urgent-Request-for-Dashboard-Panel/m-p/703658#M20713</guid>
      <dc:creator>santoshpatil01</dc:creator>
      <dc:date>2024-11-06T12:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: Its Urgent - Request for Dashboard Panel</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Its-Urgent-Request-for-Dashboard-Panel/m-p/703694#M20718</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273798"&gt;@santoshpatil01&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Your request is lacking useful information for anyone to help. It is not clear the query format that will serve as your base search so maybe you'll have to adjust that to your reality.&lt;BR /&gt;&lt;BR /&gt;Basically you'll need to have a base query that returns all raw data for the tokens wherever they are, and then you create the panels accordingly.&lt;BR /&gt;If you don't have the input fields to set the tokens, you'll need to set them as well on each panel OR in the dashboard header depending on the filter active necessity.&lt;/P&gt;
&lt;P&gt;In each panel, mention the base search making this a linked search, and use as query something like this:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Total request number for security token/priority token filtered by partner name&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.partner$
| stats count as "Total Requests" by security_token, priority_token&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Duplicate request number filtered by partner name and customer ID (to check if current expiration time for both tokens are appropriate)&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.parner$ AND customerId=$token.customerId$
| stats count by parner, customerId
| where count&amp;gt;1&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Priority token usage filtered by partner name&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| search partner=$token.parner$
| stats count by token_name&lt;/LI-CODE&gt;
&lt;UL class=""&gt;
&lt;LI&gt;Response time analysis for security token/priority token&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="markup"&gt;| stats avg(response_time) as response_time by security_token, priority_token&lt;/LI-CODE&gt;
&lt;P&gt;Or if you need 90th percentile instead:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| stats p90(response_time) as response_time by security_token, priority_token
&lt;/LI-CODE&gt;
&lt;P&gt;Again, this is just a scratch in the surface as I don't know your query, field names and additional information, but it should be enough for you to kick this off and play around.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 15:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Its-Urgent-Request-for-Dashboard-Panel/m-p/703694#M20718</guid>
      <dc:creator>victor_menezes</dc:creator>
      <dc:date>2024-11-06T15:47:11Z</dc:date>
    </item>
  </channel>
</rss>

