<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Panel(single value,table) values are changing to 0 when there is values in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Panel-single-value-table-values-are-changing-to-0-when-there-is/m-p/579838#M47488</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;are you sure that your base search didn't exceed splunk limit 500k events? You should avoid base searches without transforming commands (like stats, chart, time chart etc.).&lt;/P&gt;&lt;P&gt;Here is more about it&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/help-on-base-search-event-limit/m-p/574058#M200053" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/help-on-base-search-event-limit/m-p/574058#M200053&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Viz/Savedsearches" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Viz/Savedsearches&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jan 2022 07:53:23 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2022-01-04T07:53:23Z</dc:date>
    <item>
      <title>Panel(single value,table) values are changing to 0 when there is values</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Panel-single-value-table-values-are-changing-to-0-when-there-is/m-p/579829#M47487</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have created a single value and statistical table panel using the below base search ,&lt;/P&gt;&lt;P&gt;base search :&lt;/P&gt;&lt;P&gt;&amp;lt;search id="search1"&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;index=s (sourcetype=S_Crd OR sourcetype=S_Fire) | fields *&amp;lt;/query&amp;gt;&lt;BR /&gt;&amp;lt;earliest&amp;gt;-24h@h&amp;lt;/earliest&amp;gt;&lt;BR /&gt;&amp;lt;latest&amp;gt;now&amp;lt;/latest&amp;gt;&lt;BR /&gt;&amp;lt;/search&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In search:&lt;/P&gt;&lt;P&gt;&amp;lt;single&amp;gt;&lt;BR /&gt;&amp;lt;search base="search1"&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;&lt;/P&gt;&lt;P&gt;| rex field=_raw "Fire=(?&amp;amp;lt;FireEye&amp;amp;gt;.*?),"&lt;/P&gt;&lt;P&gt;| rex mode=sed field=Fire "s/\\\"//g"&lt;/P&gt;&lt;P&gt;| stats values(*) as * values(sourcetype) as sourcetype by sysid&lt;/P&gt;&lt;P&gt;| fillnull value=""&lt;/P&gt;&lt;P&gt;|evalOS=case(like(OS,"%Windows%"),"Windows",like(OS,"%Linux%"),"Linux",like(OS,"%Missing%"),"Others",like(OS,"%Solaris%"),"Solaris",like(OS,"%AIX%"),"AIX",1=1,"Others")&lt;/P&gt;&lt;P&gt;|search $os$&amp;nbsp;&lt;/P&gt;&lt;P&gt;|stats count&amp;lt;/query&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/search&amp;gt;&lt;/P&gt;&lt;P&gt;sometime I am getting correct values but suddenly it displays 0 in all panels including this.After giving ctrl + F5 ,the issue gets resolved .May i know the reason for this and how to resolve this in dashboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 06:54:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Panel-single-value-table-values-are-changing-to-0-when-there-is/m-p/579829#M47487</guid>
      <dc:creator>dtccsundar</dc:creator>
      <dc:date>2022-01-04T06:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: Panel(single value,table) values are changing to 0 when there is values</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Panel-single-value-table-values-are-changing-to-0-when-there-is/m-p/579838#M47488</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;are you sure that your base search didn't exceed splunk limit 500k events? You should avoid base searches without transforming commands (like stats, chart, time chart etc.).&lt;/P&gt;&lt;P&gt;Here is more about it&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/help-on-base-search-event-limit/m-p/574058#M200053" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/help-on-base-search-event-limit/m-p/574058#M200053&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Viz/Savedsearches" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Viz/Savedsearches&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 07:53:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Panel-single-value-table-values-are-changing-to-0-when-there-is/m-p/579838#M47488</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2022-01-04T07:53:23Z</dc:date>
    </item>
  </channel>
</rss>

