<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best approach using tstats for splunk dashboard and visualize data in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696936#M57125</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you are working on Datamodels, so the only approach is to creater a calculated field that, when the DM is populated, it takes a value when a field is empty, e.g.:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval destination=if(isempty(destination),"unknown",destination)&lt;/LI-CODE&gt;&lt;P&gt;but you have to do this as a calculated field to use in the population searcjh, not in the same search.&lt;/P&gt;&lt;P&gt;Then you have to do this for all your fields.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 08:44:15 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-08-21T08:44:15Z</dc:date>
    <item>
      <title>Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696881#M57117</link>
      <description>&lt;P&gt;What is the best approach for data visualization using tstats? I am new to using tstats, I moved away from using the regular search index because it speeds up the query process.&lt;BR /&gt;&lt;BR /&gt;for example making this query to show the vulnerabilities found on each ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=t dc(Vulnerability.signature) as vulnerabilities from datamodel=Vulnerability by Vulnerability.dest 
| sort -vulnerabilities 
| rename Vulnerability.dest as ip_address 
| table ip_address vulnerabilities&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example, first line from that query show ip 192.168.1.5 has 4521 vulnerabilities found&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;then I also created another detail table to verify and show some other columns related to that ip (click ip and send token) but it shows a different amount of data (4638 events).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats summariesonly=t count FROM datamodel=Vulnerability WHERE Vulnerability.destination="192.168.1.5" AND Vulnerability.signature="*" BY Vulnerability.destination, Vulnerability.signature, Vulnerability.severity, Vulnerability.last_scan, Vulnerability.risk_score, Vulnerability.cve, Vulnerability.cvss_v3_score, Vulnerability.solution 
| `drop_dm_object_name(Vulnerability)` 
| rename destination as ip_address 
| fillnull value="Unknown" ip_address signature severity last_scan risk_score cve cvss_v3_score solution
| table ip_address signature severity last_scan risk_score cve cvss_v3_score solution&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and I know this is related to the inaccuracy of the query, because if Ichange the "BY" parameter it will change the amount of data displayed too.&lt;BR /&gt;&lt;BR /&gt;how to make the data count of this query match the same output as the first query, but still display other fields even though they are empty.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 17:46:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696881#M57117</guid>
      <dc:creator>elend</dc:creator>
      <dc:date>2024-08-20T17:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696921#M57120</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;your two searches are completely different, so it's normal to have different results.&lt;/P&gt;&lt;P&gt;probably in the additional fields that you usend in the second search, there's some empty value, so for this reason the related results are discarded in the second search results.&lt;/P&gt;&lt;P&gt;In other words, you cannot compare these two searches.&lt;/P&gt;&lt;P&gt;to really compare them, you should modify the DataModel rules adding a calculated field that when there's an empty value for each field, it adds e fixed value (e.g.: "unknown"), as you can find for the user field in the authentication data model.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 06:40:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696921#M57120</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-08-21T06:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696930#M57124</link>
      <description>&lt;P&gt;is it possible to make the null value filled with some value so it still counted?. i search for this option and there is some solution&lt;BR /&gt;- made change on props conf to eval the null value&lt;BR /&gt;- use tstats ... fillnull_value="null"&lt;BR /&gt;&lt;BR /&gt;is there other option or best approach for this?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 08:07:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696930#M57124</guid>
      <dc:creator>elend</dc:creator>
      <dc:date>2024-08-21T08:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696936#M57125</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you are working on Datamodels, so the only approach is to creater a calculated field that, when the DM is populated, it takes a value when a field is empty, e.g.:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval destination=if(isempty(destination),"unknown",destination)&lt;/LI-CODE&gt;&lt;P&gt;but you have to do this as a calculated field to use in the population searcjh, not in the same search.&lt;/P&gt;&lt;P&gt;Then you have to do this for all your fields.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 08:44:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696936#M57125</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-08-21T08:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696944#M57128</link>
      <description>&lt;P&gt;Actually I already evals all field and made fillnull with "Unknonwn" strings all the fields. However some queries show same amount of event, but some field filled&amp;nbsp;"Unknonwn" even it actually have values.&amp;nbsp;&lt;BR /&gt;Or rebuild the datamodel is needed?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 09:38:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696944#M57128</guid>
      <dc:creator>elend</dc:creator>
      <dc:date>2024-08-21T09:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach using tstats for splunk dashboard and visualize data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696962#M57133</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;yes, you have to rebuild the DataModel, otherwise the change is applied only to new events.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:36:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Best-approach-using-tstats-for-splunk-dashboard-and-visualize/m-p/696962#M57133</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-08-21T14:36:47Z</dc:date>
    </item>
  </channel>
</rss>

