<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495796#M138200</link>
    <description>&lt;P&gt;Basically, I am trying to visualize all events which match up to the initial query, and provide a bar graph output. Then, I want to perform another query which overlays events that are also "pan_wildfire" events. Here's the query I currently have. It works, but doesn't provide anything meaningful.&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked | timechart count(action) by date | appendcols [search index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked eventtype = pan_wildfire] | timechart count(action) by date&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;If I remove everything after the first "timechart", I get the timechart I expect. What I am hoping to accomplish is to show that data, then overlay in a different color the second timechart visualization. I expect this to be a much smaller piece of data, but it's important I show those as well.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2020 16:11:29 GMT</pubDate>
    <dc:creator>z432u4kvfkcg</dc:creator>
    <dc:date>2020-01-24T16:11:29Z</dc:date>
    <item>
      <title>Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495796#M138200</link>
      <description>&lt;P&gt;Basically, I am trying to visualize all events which match up to the initial query, and provide a bar graph output. Then, I want to perform another query which overlays events that are also "pan_wildfire" events. Here's the query I currently have. It works, but doesn't provide anything meaningful.&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked | timechart count(action) by date | appendcols [search index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked eventtype = pan_wildfire] | timechart count(action) by date&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;If I remove everything after the first "timechart", I get the timechart I expect. What I am hoping to accomplish is to show that data, then overlay in a different color the second timechart visualization. I expect this to be a much smaller piece of data, but it's important I show those as well.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 16:11:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495796#M138200</guid>
      <dc:creator>z432u4kvfkcg</dc:creator>
      <dc:date>2020-01-24T16:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495797#M138201</link>
      <description>&lt;P&gt;@z432u4kvfkcg when your intent is to plot a timechart, the reason to split by date field is not so clear. Also, based on the search you have provided seems like you dont need subsearch appendcols at all. Please try the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked
| timechart count as All_Blocked_count count(eval(eventtype= pan_wildfire)) as Pan_Wildfire_Blocked_count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Jan 2020 17:43:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495797#M138201</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-01-24T17:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495798#M138202</link>
      <description>&lt;P&gt;So that worked a lot better, but the Pan_wildfire_blocked isn't showing any events, when I know for a fact I have them. I had one today, but it's not showing up anywhere.&lt;/P&gt;

&lt;P&gt;I want to show this by date because I want to understand a day-by-day trend for decrypted threat events vs. decrypted threat events which also have the pan_wildfire event type.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:54:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495798#M138202</guid>
      <dc:creator>z432u4kvfkcg</dc:creator>
      <dc:date>2020-09-30T03:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495799#M138203</link>
      <description>&lt;P&gt;Hi @z432u4kvfkcg &lt;CODE&gt;eventtype=pan_wildfire&lt;/CODE&gt; exists then the query should work.&lt;/P&gt;

&lt;P&gt;Do you get results when you perform the following command:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked eventtype=Pan_wildfire
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or what do you see when you run the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked 
| stats count by eventtype
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also adding span=1d should bucket daily stats for you. For example: &lt;CODE&gt;| timechart span=1d ............&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 18:45:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495799#M138203</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-01-24T18:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495800#M138204</link>
      <description>&lt;P&gt;Yes, I get results for both. I found out I needed to enclose pan_wildfire in quotes, so it actually needed to be something like threat_category="wildfire" or it never found the events.&lt;/P&gt;

&lt;P&gt;Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:54:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495800#M138204</guid>
      <dc:creator>z432u4kvfkcg</dc:creator>
      <dc:date>2020-09-30T03:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495801#M138205</link>
      <description>&lt;P&gt;Ok, one last snag. Now I'm trying to compare both of these to overall SSL traffic in a specific zone. Here's the query, but I'm obviously doing something wrong  with how I am nesting the previous two pieces into the new part (which is &lt;EM&gt;index="paloalto" src_zone=zoneA OR src_zone=zoneB app=ssl&lt;/EM&gt; ) because I get this error:&lt;BR /&gt;
Error in 'timechart' command: The eval expression for dynamic field 'flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked' is invalid. Error='The operator at 'type=THREAT threat!="MP4 Detected(52104)" action=blocked' is invalid.'.&lt;/P&gt;

&lt;P&gt;New query:&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;index="paloalto" src_zone=zoneA OR src_zone=zoneB app=ssl | timechart count as All_Decrypted_Traffic count(eval(flags=decrypted type=THREAT threat!="MP4 Detected(52104)" action=blocked)) as Decrypted_Threat | timechart count as All_Blocked_count count(eval(eventtype="pan_wildfire_malicious")) as Pan_Wildfire_Blocked_count&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:54:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495801#M138205</guid>
      <dc:creator>z432u4kvfkcg</dc:creator>
      <dc:date>2020-09-30T03:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495802#M138206</link>
      <description>&lt;P&gt;&lt;STRONG&gt;UPDATE&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="paloalto" (src_zone=zoneA OR src_zone=zoneB) app=ssl 
| timechart span=1d count as All_Decrypted_Traffic
,count(eval(flags=decrypted
AND type=THREAT 
AND threat!="MP4 Detected(52104)"
AND action=blocked)) as All_Blocked_count
,count(eval(eventtype="pan_wildfire_malicious")) as Pan_Wildfire_Blocked_count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I think you create 4 counts.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 20:51:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495802#M138206</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-01-24T20:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: Need help visualizing a search which contains a main query, then a small subset of the main query and putting this all in one visualization</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495803#M138207</link>
      <description>&lt;P&gt;Well, I'm trying to show a graph of overall SSL traffic (which is the first part), then a graph showing the decrypted traffic (&lt;EM&gt;index="paloalto" flags=decrypted type=THREAT threat!="MP4 Detected(52104)"&lt;/EM&gt;), then a final part showing the wildfire events (which is a very small number of things, and this is currently searching via &lt;EM&gt;timechart count as All_Blocked_count count(eval(eventtype= pan_wildfire)) as Pan_Wildfire_Blocked_count&lt;/EM&gt; )&lt;/P&gt;

&lt;P&gt;I would like this all as three separate bar charts or line charts- basically, to show the difference between each type of traffic flow. We start with SSL traffic, decrypt a small part of that (and I want to show the threat events found in decrypted traffic), then I finally want to show the wildfire findings in that decrypt traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:55:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-visualizing-a-search-which-contains-a-main-query-then/m-p/495803#M138207</guid>
      <dc:creator>z432u4kvfkcg</dc:creator>
      <dc:date>2020-09-30T03:55:01Z</dc:date>
    </item>
  </channel>
</rss>

