<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Show two timecharts in one dashboard panel? in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Show-two-timecharts-in-one-dashboard-panel/m-p/74133#M3984</link>
    <description>&lt;P&gt;I'm trying to turn Splunk into my own custom IDS based on the data dumping in from Palo Alto. Right now I have a search that throws back a timechart of the top internal IPs...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="pan_threat" log_subtype="spyware" (severity="high" OR "critical") | eval frp_ip=if(dst_zone="trust", dst_ip, src_ip) | timechart count by frp_ip useother=f
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That works fantastically. Shows me the top 10 IPs throwing high or critical threat traffic. However, I want to correlate a baseline into it using the trendline command. However, I can't figure out how / where to throw the trendline command to get the desired effect of the trendline overlaying the existing chart. I also don't know how to throw the "period" field, as I don't know what the integer represents. (Seconds? Minutes? Something completely different that won't automatically correlate with time? Can I just throw a command in there for it to find the search window and automatically use that?) However, even when using the following code, it doesn't change my chart at all (threw 5 in there for testing purposes).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="pan_threat" log_subtype="spyware" (severity="high" OR "critical") | eval frp_ip=if(dst_zone="trust", dst_ip, src_ip) | timechart count by frp_ip useother=f | trendline sma5(count)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone familiar with this usage that can give me a little advice? I'm far from a RegEx Guru, but if building this IDS myself without XML Edit access has taught me anything, it's the inner workings of RegEx.&lt;/P&gt;

&lt;P&gt;-Travis&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2013 15:17:43 GMT</pubDate>
    <dc:creator>tfitzgerald15</dc:creator>
    <dc:date>2013-09-26T15:17:43Z</dc:date>
    <item>
      <title>Show two timecharts in one dashboard panel?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Show-two-timecharts-in-one-dashboard-panel/m-p/74133#M3984</link>
      <description>&lt;P&gt;I'm trying to turn Splunk into my own custom IDS based on the data dumping in from Palo Alto. Right now I have a search that throws back a timechart of the top internal IPs...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="pan_threat" log_subtype="spyware" (severity="high" OR "critical") | eval frp_ip=if(dst_zone="trust", dst_ip, src_ip) | timechart count by frp_ip useother=f
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That works fantastically. Shows me the top 10 IPs throwing high or critical threat traffic. However, I want to correlate a baseline into it using the trendline command. However, I can't figure out how / where to throw the trendline command to get the desired effect of the trendline overlaying the existing chart. I also don't know how to throw the "period" field, as I don't know what the integer represents. (Seconds? Minutes? Something completely different that won't automatically correlate with time? Can I just throw a command in there for it to find the search window and automatically use that?) However, even when using the following code, it doesn't change my chart at all (threw 5 in there for testing purposes).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="pan_threat" log_subtype="spyware" (severity="high" OR "critical") | eval frp_ip=if(dst_zone="trust", dst_ip, src_ip) | timechart count by frp_ip useother=f | trendline sma5(count)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone familiar with this usage that can give me a little advice? I'm far from a RegEx Guru, but if building this IDS myself without XML Edit access has taught me anything, it's the inner workings of RegEx.&lt;/P&gt;

&lt;P&gt;-Travis&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2013 15:17:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Show-two-timecharts-in-one-dashboard-panel/m-p/74133#M3984</guid>
      <dc:creator>tfitzgerald15</dc:creator>
      <dc:date>2013-09-26T15:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Show two timecharts in one dashboard panel?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Show-two-timecharts-in-one-dashboard-panel/m-p/74134#M3985</link>
      <description>&lt;P&gt;The problem is that your timechart returns result in a table like :&lt;BR /&gt;
_time ip1 ip2 ip3&lt;BR /&gt;
2013-09-26 11:00:00 valueA valueB valueC&lt;BR /&gt;
2013-09-26 11:10:00  valueA valueB valueC&lt;BR /&gt;
etc...&lt;/P&gt;

&lt;P&gt;and your trendline function is looking for a "count" field that doesn't exits anymore ( it has the name of the frp_ip instead)&lt;/P&gt;

&lt;P&gt;You could do a specific trendline for a precise ip only.&lt;/P&gt;

&lt;P&gt;Or use a general trendline over the total values&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype="pan_threat" log_subtype="spyware" (severity="high" OR "critical") | eval frp_ip=if(dst_zone="trust", dst_ip, src_ip) | timechart count by frp_ip useother=f | addtotals  | trendline sma5(Total)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2013 19:24:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Show-two-timecharts-in-one-dashboard-panel/m-p/74134#M3985</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2013-09-26T19:24:30Z</dc:date>
    </item>
  </channel>
</rss>

