<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is there an app or dashboard to explore WinEventLogs? in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/482041#M31615</link>
    <description>&lt;P&gt;Here&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;form script="wineventlog.js"&amp;gt;
  &amp;lt;label&amp;gt;WinEventLog Explorer&amp;lt;/label&amp;gt;
  &amp;lt;description&amp;gt;&amp;lt;/description&amp;gt;

  &amp;lt;search&amp;gt;
    &amp;lt;query&amp;gt;
| makeresults | addinfo | eval temp_earliest=info_min_time | eval temp_latest=if(info_max_time="+Infinity",now(),info_max_time)
    &amp;lt;/query&amp;gt;
    &amp;lt;earliest&amp;gt;$TIMERANGE1.earliest$&amp;lt;/earliest&amp;gt;
    &amp;lt;latest&amp;gt;$TIMERANGE1.latest$&amp;lt;/latest&amp;gt;
    &amp;lt;preview&amp;gt;
      &amp;lt;set token="pst_earliest_onChange1"&amp;gt;$result.temp_earliest$&amp;lt;/set&amp;gt;
      &amp;lt;set token="pst_latest_onChange1"&amp;gt;$result.temp_latest$&amp;lt;/set&amp;gt;
    &amp;lt;/preview&amp;gt;
  &amp;lt;/search&amp;gt;
  &amp;lt;search&amp;gt;
    &amp;lt;query&amp;gt;
| makeresults | eval initial_logs="$logs$" | eval logs=split(initial_logs,",") | mvexpand logs | rex field=logs " (?&amp;lt;eventcode&amp;gt;.+)" | stats values(eventcode) AS eventcodes | eval eventcodes_query="EventCode=".mvjoin(eventcodes," OR EventCode=")
    &amp;lt;/query&amp;gt;
    &amp;lt;preview&amp;gt;
      &amp;lt;set token="eventcodes_query"&amp;gt;$result.eventcodes_query$&amp;lt;/set&amp;gt;
    &amp;lt;/preview&amp;gt;
  &amp;lt;/search&amp;gt;

  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;html&amp;gt;
        &amp;lt;br/&amp;gt;
        &amp;lt;p&amp;gt;
Select &amp;lt;b&amp;gt;search raw data&amp;lt;/b&amp;gt; to search raw data. &amp;lt;b&amp;gt;Strongly not recommended&amp;lt;/b&amp;gt; for time periods greater than 1h.
        &amp;lt;/p&amp;gt;
        &amp;lt;p&amp;gt;
If &amp;lt;b&amp;gt;search raw data&amp;lt;/b&amp;gt; is not selected, these data fields are searched: 
        &amp;lt;/p&amp;gt;
        &amp;lt;ul&amp;gt;     
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;NetworkID -- user, User, Mapped_Name&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;Hostname -- host, src, Caller_Computer_Name&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;IP -- Source_Address, Source_Network_Address, Network_Address, Destination_Address&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
        &amp;lt;/ul&amp;gt;
        &amp;lt;br/&amp;gt;
      &amp;lt;/html&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Search ($search_count$)&amp;lt;/title&amp;gt;
      &amp;lt;input type="time" token="TIMERANGE1"&amp;gt;
        &amp;lt;label&amp;gt;Period:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;
          &amp;lt;earliest&amp;gt;@d&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;now&amp;lt;/latest&amp;gt;
        &amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="text" token="network_id_onChange"&amp;gt;
        &amp;lt;label&amp;gt;NetworkID:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;*&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="text" token="host_onChange"&amp;gt;
        &amp;lt;label&amp;gt;Hostname or IP:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;*&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="checkbox" token="raw_onChange"&amp;gt;
        &amp;lt;label&amp;gt;&amp;lt;/label&amp;gt;
        &amp;lt;choice value="*"&amp;gt;Search raw data?&amp;lt;/choice&amp;gt;
        &amp;lt;default&amp;gt;junkvalue&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="multiselect" token="logs_onChange" id="multiselect_logs"&amp;gt;
        &amp;lt;label&amp;gt;Log(s):&amp;lt;/label&amp;gt;
        &amp;lt;choice value="All *"&amp;gt;All&amp;lt;/choice&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;
index=wineventlog earliest=-5m latest=now | dedup EventCode | rex field=source "WinEventLog:(?&amp;lt;logname&amp;gt;.+)" | eval log=logname." ".EventCode | sort 0 log | table log
          &amp;lt;/query&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;fieldForLabel&amp;gt;log&amp;lt;/fieldForLabel&amp;gt;
        &amp;lt;fieldForValue&amp;gt;log&amp;lt;/fieldForValue&amp;gt;
        &amp;lt;delimiter&amp;gt;,&amp;lt;/delimiter&amp;gt;
        &amp;lt;default&amp;gt;All *&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="link" id="submit_button1"&amp;gt;
        &amp;lt;label&amp;gt;&amp;lt;/label&amp;gt;
        &amp;lt;choice value="submit"&amp;gt;Submit&amp;lt;/choice&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;html depends="$hide$"&amp;gt;
        &amp;lt;style&amp;gt;
          #multiselect_logs div[data-component="splunk-core:/splunkjs/mvc/components/MultiDropdown"]{
            width: 350px !important;
          }
          #multiselect_logs div[data-view="splunkjs/mvc/multidropdownview"]{
            width: 350px !important;
            margin-right: auto !important;
          }
          .fieldset .input{
            width:auto !important;
          }
          #submit_button1{
            width:80px !important;
          }
          #submit_button1 div[data-component="splunk-core:/splunkjs/mvc/components/LinkList"]{
            width:80px !important;
          }
          #submit_button1  button{
            padding: 6px 15px !important;
            border-radius: 3px !important;
            font-weight: 500 !important;
            background-color: #5cc05c !important;
            border: transparent !important;
            color: #fff !important;
          }
          #submit_button1  button:hover{
            background-color: #40a540 !important;
            border-color: transparent !important;
          }
        &amp;lt;/style&amp;gt;
      &amp;lt;/html&amp;gt;
      &amp;lt;table&amp;gt;
      &amp;lt;search&amp;gt;
        &amp;lt;query&amp;gt;
index=wineventlog (("$network_id$" AND "$host$") AND _time="$raw$") OR (user="*$network_id$*" OR User="*$network_id$*" OR Mapped_Name="*$network_id$*") AND (host="*$host$*" OR src="*$host$*" OR Caller_Computer_Name="*$host$*" OR Source_Address="*$host$*" OR Source_Network_Address="*$host$*" OR Network_Address="*$host$*" OR Destination_Address="*$host$*") $eventcodes_query$ |
eval trigger="$submit_trigger1$" | sort 0 - _time | rename _time AS time | eval time=strftime(time,"%m-%d-%Y %H:%M:%S") | table time source EventCode EventCodeDescription user User Mapped_Name host src Source_Address Caller_Computer_Name Workstation_Name Source_Network_Address Network_Address Destination_Address Keywords Application_Name Process_Name | 
streamstats count as temp_count | stats values(*) as * by temp_count | fields - temp_count | table time* source* EventCode* EventCodeDescription* user* User* Mapped_Name* host* src* Source_Address* Caller_Computer_Name* Workstation_Name* Source_Network_Address* Network_Address* Destination_Address* Keywords* Application_Name* Process_Name* | eventstats count as _count
        &amp;lt;/query&amp;gt;
        &amp;lt;earliest&amp;gt;$pst_earliest1$&amp;lt;/earliest&amp;gt;
        &amp;lt;latest&amp;gt;$pst_latest1$&amp;lt;/latest&amp;gt;
        &amp;lt;progress&amp;gt;
          &amp;lt;set token="search_count"&amp;gt;$result._count$&amp;lt;/set&amp;gt;
        &amp;lt;/progress&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;option name="count"&amp;gt;5&amp;lt;/option&amp;gt;
        &amp;lt;option name="dataOverlayMode"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="rowNumbers"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;
      &amp;lt;/table&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
&amp;lt;/form&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; require([
     'jquery',
     'splunkjs/mvc',
     'splunkjs/mvc/simplexml/ready!'
 ], function($,mvc){
     var submittedTokens = mvc.Components.get("submitted");
     $("#submit_button1").click(function(){
         submittedTokens.set("submit_trigger1", ""+Math.random());
         submittedTokens.set("pst_earliest1",submittedTokens.get("pst_earliest_onChange1"));
         submittedTokens.set("pst_latest1",submittedTokens.get("pst_latest_onChange1"));
         submittedTokens.set("network_id",submittedTokens.get("network_id_onChange"));
         submittedTokens.set("host",submittedTokens.get("host_onChange"));
         submittedTokens.set("logs",submittedTokens.get("logs_onChange"));
         submittedTokens.set("raw",submittedTokens.get("raw_onChange"));
     });
     $(document).on('keyup', function(e){
         if (e.which === 13 || event.keyCode === 13 || event.key === "Enter") {
             submittedTokens.set("submit_trigger1", ""+Math.random());
             submittedTokens.set("pst_earliest1",submittedTokens.get("pst_earliest_onChange1"));
             submittedTokens.set("pst_latest1",submittedTokens.get("pst_latest_onChange1"));
             submittedTokens.set("network_id",submittedTokens.get("network_id_onChange"));
             submittedTokens.set("host",submittedTokens.get("host_onChange"));
             submittedTokens.set("logs",submittedTokens.get("logs_onChange"));
             submittedTokens.set("raw",submittedTokens.get("raw_onChange"));
         }
     });
 });
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 10 Jan 2020 18:38:22 GMT</pubDate>
    <dc:creator>nick405060</dc:creator>
    <dc:date>2020-01-10T18:38:22Z</dc:date>
    <item>
      <title>Is there an app or dashboard to explore WinEventLogs?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/482040#M31614</link>
      <description>&lt;P&gt;Is there an app or dashboard to search WinEventLogs? &lt;A href="https://splunkbase.splunk.com/app/3067"&gt;https://splunkbase.splunk.com/app/3067&lt;/A&gt; doesn't really let you search your WinEventLogs, it mostly just gives high level metrics&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 18:36:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/482040#M31614</guid>
      <dc:creator>nick405060</dc:creator>
      <dc:date>2020-01-10T18:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Is there an app or dashboard to explore WinEventLogs?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/482041#M31615</link>
      <description>&lt;P&gt;Here&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;form script="wineventlog.js"&amp;gt;
  &amp;lt;label&amp;gt;WinEventLog Explorer&amp;lt;/label&amp;gt;
  &amp;lt;description&amp;gt;&amp;lt;/description&amp;gt;

  &amp;lt;search&amp;gt;
    &amp;lt;query&amp;gt;
| makeresults | addinfo | eval temp_earliest=info_min_time | eval temp_latest=if(info_max_time="+Infinity",now(),info_max_time)
    &amp;lt;/query&amp;gt;
    &amp;lt;earliest&amp;gt;$TIMERANGE1.earliest$&amp;lt;/earliest&amp;gt;
    &amp;lt;latest&amp;gt;$TIMERANGE1.latest$&amp;lt;/latest&amp;gt;
    &amp;lt;preview&amp;gt;
      &amp;lt;set token="pst_earliest_onChange1"&amp;gt;$result.temp_earliest$&amp;lt;/set&amp;gt;
      &amp;lt;set token="pst_latest_onChange1"&amp;gt;$result.temp_latest$&amp;lt;/set&amp;gt;
    &amp;lt;/preview&amp;gt;
  &amp;lt;/search&amp;gt;
  &amp;lt;search&amp;gt;
    &amp;lt;query&amp;gt;
| makeresults | eval initial_logs="$logs$" | eval logs=split(initial_logs,",") | mvexpand logs | rex field=logs " (?&amp;lt;eventcode&amp;gt;.+)" | stats values(eventcode) AS eventcodes | eval eventcodes_query="EventCode=".mvjoin(eventcodes," OR EventCode=")
    &amp;lt;/query&amp;gt;
    &amp;lt;preview&amp;gt;
      &amp;lt;set token="eventcodes_query"&amp;gt;$result.eventcodes_query$&amp;lt;/set&amp;gt;
    &amp;lt;/preview&amp;gt;
  &amp;lt;/search&amp;gt;

  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;html&amp;gt;
        &amp;lt;br/&amp;gt;
        &amp;lt;p&amp;gt;
Select &amp;lt;b&amp;gt;search raw data&amp;lt;/b&amp;gt; to search raw data. &amp;lt;b&amp;gt;Strongly not recommended&amp;lt;/b&amp;gt; for time periods greater than 1h.
        &amp;lt;/p&amp;gt;
        &amp;lt;p&amp;gt;
If &amp;lt;b&amp;gt;search raw data&amp;lt;/b&amp;gt; is not selected, these data fields are searched: 
        &amp;lt;/p&amp;gt;
        &amp;lt;ul&amp;gt;     
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;NetworkID -- user, User, Mapped_Name&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;Hostname -- host, src, Caller_Computer_Name&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
          &amp;lt;li&amp;gt;
            &amp;lt;p&amp;gt;IP -- Source_Address, Source_Network_Address, Network_Address, Destination_Address&amp;lt;/p&amp;gt;
          &amp;lt;/li&amp;gt;
        &amp;lt;/ul&amp;gt;
        &amp;lt;br/&amp;gt;
      &amp;lt;/html&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
  &amp;lt;row&amp;gt;
    &amp;lt;panel&amp;gt;
      &amp;lt;title&amp;gt;Search ($search_count$)&amp;lt;/title&amp;gt;
      &amp;lt;input type="time" token="TIMERANGE1"&amp;gt;
        &amp;lt;label&amp;gt;Period:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;
          &amp;lt;earliest&amp;gt;@d&amp;lt;/earliest&amp;gt;
          &amp;lt;latest&amp;gt;now&amp;lt;/latest&amp;gt;
        &amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="text" token="network_id_onChange"&amp;gt;
        &amp;lt;label&amp;gt;NetworkID:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;*&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="text" token="host_onChange"&amp;gt;
        &amp;lt;label&amp;gt;Hostname or IP:&amp;lt;/label&amp;gt;
        &amp;lt;default&amp;gt;*&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="checkbox" token="raw_onChange"&amp;gt;
        &amp;lt;label&amp;gt;&amp;lt;/label&amp;gt;
        &amp;lt;choice value="*"&amp;gt;Search raw data?&amp;lt;/choice&amp;gt;
        &amp;lt;default&amp;gt;junkvalue&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="multiselect" token="logs_onChange" id="multiselect_logs"&amp;gt;
        &amp;lt;label&amp;gt;Log(s):&amp;lt;/label&amp;gt;
        &amp;lt;choice value="All *"&amp;gt;All&amp;lt;/choice&amp;gt;
        &amp;lt;search&amp;gt;
          &amp;lt;query&amp;gt;
index=wineventlog earliest=-5m latest=now | dedup EventCode | rex field=source "WinEventLog:(?&amp;lt;logname&amp;gt;.+)" | eval log=logname." ".EventCode | sort 0 log | table log
          &amp;lt;/query&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;fieldForLabel&amp;gt;log&amp;lt;/fieldForLabel&amp;gt;
        &amp;lt;fieldForValue&amp;gt;log&amp;lt;/fieldForValue&amp;gt;
        &amp;lt;delimiter&amp;gt;,&amp;lt;/delimiter&amp;gt;
        &amp;lt;default&amp;gt;All *&amp;lt;/default&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;input type="link" id="submit_button1"&amp;gt;
        &amp;lt;label&amp;gt;&amp;lt;/label&amp;gt;
        &amp;lt;choice value="submit"&amp;gt;Submit&amp;lt;/choice&amp;gt;
      &amp;lt;/input&amp;gt;
      &amp;lt;html depends="$hide$"&amp;gt;
        &amp;lt;style&amp;gt;
          #multiselect_logs div[data-component="splunk-core:/splunkjs/mvc/components/MultiDropdown"]{
            width: 350px !important;
          }
          #multiselect_logs div[data-view="splunkjs/mvc/multidropdownview"]{
            width: 350px !important;
            margin-right: auto !important;
          }
          .fieldset .input{
            width:auto !important;
          }
          #submit_button1{
            width:80px !important;
          }
          #submit_button1 div[data-component="splunk-core:/splunkjs/mvc/components/LinkList"]{
            width:80px !important;
          }
          #submit_button1  button{
            padding: 6px 15px !important;
            border-radius: 3px !important;
            font-weight: 500 !important;
            background-color: #5cc05c !important;
            border: transparent !important;
            color: #fff !important;
          }
          #submit_button1  button:hover{
            background-color: #40a540 !important;
            border-color: transparent !important;
          }
        &amp;lt;/style&amp;gt;
      &amp;lt;/html&amp;gt;
      &amp;lt;table&amp;gt;
      &amp;lt;search&amp;gt;
        &amp;lt;query&amp;gt;
index=wineventlog (("$network_id$" AND "$host$") AND _time="$raw$") OR (user="*$network_id$*" OR User="*$network_id$*" OR Mapped_Name="*$network_id$*") AND (host="*$host$*" OR src="*$host$*" OR Caller_Computer_Name="*$host$*" OR Source_Address="*$host$*" OR Source_Network_Address="*$host$*" OR Network_Address="*$host$*" OR Destination_Address="*$host$*") $eventcodes_query$ |
eval trigger="$submit_trigger1$" | sort 0 - _time | rename _time AS time | eval time=strftime(time,"%m-%d-%Y %H:%M:%S") | table time source EventCode EventCodeDescription user User Mapped_Name host src Source_Address Caller_Computer_Name Workstation_Name Source_Network_Address Network_Address Destination_Address Keywords Application_Name Process_Name | 
streamstats count as temp_count | stats values(*) as * by temp_count | fields - temp_count | table time* source* EventCode* EventCodeDescription* user* User* Mapped_Name* host* src* Source_Address* Caller_Computer_Name* Workstation_Name* Source_Network_Address* Network_Address* Destination_Address* Keywords* Application_Name* Process_Name* | eventstats count as _count
        &amp;lt;/query&amp;gt;
        &amp;lt;earliest&amp;gt;$pst_earliest1$&amp;lt;/earliest&amp;gt;
        &amp;lt;latest&amp;gt;$pst_latest1$&amp;lt;/latest&amp;gt;
        &amp;lt;progress&amp;gt;
          &amp;lt;set token="search_count"&amp;gt;$result._count$&amp;lt;/set&amp;gt;
        &amp;lt;/progress&amp;gt;
        &amp;lt;/search&amp;gt;
        &amp;lt;option name="count"&amp;gt;5&amp;lt;/option&amp;gt;
        &amp;lt;option name="dataOverlayMode"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="drilldown"&amp;gt;none&amp;lt;/option&amp;gt;
        &amp;lt;option name="rowNumbers"&amp;gt;false&amp;lt;/option&amp;gt;
        &amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;
      &amp;lt;/table&amp;gt;
    &amp;lt;/panel&amp;gt;
  &amp;lt;/row&amp;gt;
&amp;lt;/form&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; require([
     'jquery',
     'splunkjs/mvc',
     'splunkjs/mvc/simplexml/ready!'
 ], function($,mvc){
     var submittedTokens = mvc.Components.get("submitted");
     $("#submit_button1").click(function(){
         submittedTokens.set("submit_trigger1", ""+Math.random());
         submittedTokens.set("pst_earliest1",submittedTokens.get("pst_earliest_onChange1"));
         submittedTokens.set("pst_latest1",submittedTokens.get("pst_latest_onChange1"));
         submittedTokens.set("network_id",submittedTokens.get("network_id_onChange"));
         submittedTokens.set("host",submittedTokens.get("host_onChange"));
         submittedTokens.set("logs",submittedTokens.get("logs_onChange"));
         submittedTokens.set("raw",submittedTokens.get("raw_onChange"));
     });
     $(document).on('keyup', function(e){
         if (e.which === 13 || event.keyCode === 13 || event.key === "Enter") {
             submittedTokens.set("submit_trigger1", ""+Math.random());
             submittedTokens.set("pst_earliest1",submittedTokens.get("pst_earliest_onChange1"));
             submittedTokens.set("pst_latest1",submittedTokens.get("pst_latest_onChange1"));
             submittedTokens.set("network_id",submittedTokens.get("network_id_onChange"));
             submittedTokens.set("host",submittedTokens.get("host_onChange"));
             submittedTokens.set("logs",submittedTokens.get("logs_onChange"));
             submittedTokens.set("raw",submittedTokens.get("raw_onChange"));
         }
     });
 });
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 10 Jan 2020 18:38:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/482041#M31615</guid>
      <dc:creator>nick405060</dc:creator>
      <dc:date>2020-01-10T18:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Is there an app or dashboard to explore WinEventLogs?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/668595#M54724</link>
      <description>&lt;P&gt;Not sure why but this gives error on line 19, unexpected close of query.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 15:58:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Is-there-an-app-or-dashboard-to-explore-WinEventLogs/m-p/668595#M54724</guid>
      <dc:creator>davvik</dc:creator>
      <dc:date>2023-11-14T15:58:40Z</dc:date>
    </item>
  </channel>
</rss>

