<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Perform GET or POST action depending on table value in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Perform-GET-or-POST-action-depending-on-table-value/m-p/524636#M35549</link>
    <description>&lt;P&gt;Hi all. I am generating a dashboard table containing possible indicators of compromise observed on a network. Included in the search that generates the table is...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;| eval ActionText=if('model'="Watchlisted domain","Check on Virus Total",(mvappend("Check on Virus Total","Add to Watchlist")))&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Along with the rest of the search I end up with a table like this...&lt;/P&gt;&lt;P&gt;... | IoC&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ... | model&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ActionText&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ... | ...&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Watchlisted domain | Check on Virus Total | ... | ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Suspicious domain&amp;nbsp; &amp;nbsp;|&amp;nbsp;Check on Virus Total | ... | ...&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Add to Watchlist&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Watchlisted domain | Check on Virus Total | ... | ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to configure a drilldown so that clicking on "Check on Virus Total" in the table will perform a GET request using the IoC field as a token, and a POST action to an internal API when I click on "Add to Watchlist", again using the IoC from the corresponding row/event.&lt;/P&gt;&lt;P&gt;Any ideas for a starting point?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2020 13:54:23 GMT</pubDate>
    <dc:creator>Dworsnop</dc:creator>
    <dc:date>2020-10-14T13:54:23Z</dc:date>
    <item>
      <title>Perform GET or POST action depending on table value</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Perform-GET-or-POST-action-depending-on-table-value/m-p/524636#M35549</link>
      <description>&lt;P&gt;Hi all. I am generating a dashboard table containing possible indicators of compromise observed on a network. Included in the search that generates the table is...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;| eval ActionText=if('model'="Watchlisted domain","Check on Virus Total",(mvappend("Check on Virus Total","Add to Watchlist")))&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Along with the rest of the search I end up with a table like this...&lt;/P&gt;&lt;P&gt;... | IoC&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ... | model&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ActionText&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| ... | ...&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Watchlisted domain | Check on Virus Total | ... | ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Suspicious domain&amp;nbsp; &amp;nbsp;|&amp;nbsp;Check on Virus Total | ... | ...&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Add to Watchlist&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;... | &amp;lt;domain&amp;gt; | ... | Watchlisted domain | Check on Virus Total | ... | ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to configure a drilldown so that clicking on "Check on Virus Total" in the table will perform a GET request using the IoC field as a token, and a POST action to an internal API when I click on "Add to Watchlist", again using the IoC from the corresponding row/event.&lt;/P&gt;&lt;P&gt;Any ideas for a starting point?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 13:54:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Perform-GET-or-POST-action-depending-on-table-value/m-p/524636#M35549</guid>
      <dc:creator>Dworsnop</dc:creator>
      <dc:date>2020-10-14T13:54:23Z</dc:date>
    </item>
  </channel>
</rss>

