<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: condition drilldown - with link target in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706289#M239029</link>
    <description>&lt;P&gt;Do you mean in the second dashboard, there are inputs which are not selected as you wanted?&lt;/P&gt;&lt;P&gt;If so, it's probably because the input token is named form.xxx, so if your input dropdown for Services is the token &lt;STRONG&gt;ShortConfigRuleName&lt;/STRONG&gt;, then you should pass the URL with&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;form.ShortConfigRuleName=$row.ShortConfigRuleName$&lt;/LI-CODE&gt;</description>
    <pubDate>Sun, 08 Dec 2024 22:31:28 GMT</pubDate>
    <dc:creator>bowesmana</dc:creator>
    <dc:date>2024-12-08T22:31:28Z</dc:date>
    <item>
      <title>condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706186#M239011</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I want to make a drilldown with those services : and I have to apply a drilldow for (s3-bucket / vpc / ec2)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="anissabnk_1-1733508835150.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/33724i71156C99E67C33F7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="anissabnk_1-1733508835150.png" alt="anissabnk_1-1733508835150.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried several things but nothing works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;row&amp;gt;&lt;BR /&gt;&amp;lt;panel&amp;gt;&lt;BR /&gt;&amp;lt;title&amp;gt;AWS Services Monitoring&amp;lt;/title&amp;gt;&lt;BR /&gt;&amp;lt;table&amp;gt;&lt;BR /&gt;&amp;lt;search&amp;gt;&lt;BR /&gt;&amp;lt;!--done&amp;gt;&lt;BR /&gt;&amp;lt;set token="Services"&amp;gt;$click.name$&amp;lt;/set&amp;gt;&lt;BR /&gt;&amp;lt;/done--&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd" sourcetype="aws:s3:csv" ShortConfigRuleName="*"&lt;BR /&gt;| eval Services = case(&lt;BR /&gt;match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",&lt;BR /&gt;match(ShortConfigRuleName, "iam-password"), "iam-password",&lt;BR /&gt;match(ShortConfigRuleName, "iam-policy"), "iam-policy",&lt;BR /&gt;match(ShortConfigRuleName, "iam-user"), "iam-user",&lt;BR /&gt;match(ShortConfigRuleName, "guardduty"), "guardduty",&lt;BR /&gt;match(ShortConfigRuleName, "ec2"), "ec2",&lt;BR /&gt;match(ShortConfigRuleName, "vpc"), "vpc",&lt;BR /&gt;match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",&lt;BR /&gt;match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",&lt;BR /&gt;match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",&lt;BR /&gt;match(ShortConfigRuleName, "subnet"), "subnet",&lt;BR /&gt;match(ShortConfigRuleName, "lambda-function"), "lambda-function",&lt;BR /&gt;1=1, "Other")&lt;BR /&gt;|search Services!=Other&lt;BR /&gt;| lookup aws_security_all_account_ids account_id AS AccountId OUTPUT name&lt;BR /&gt;| table name AccountId Services ShortConfigRuleName ComplianceType OrderingTimestamp ResultRecordedTime&lt;BR /&gt;| dedup AccountId Services ShortConfigRuleName ComplianceType | rename name as "AWS Account Name", "ComplianceType" as "Status", "OrderingTimestamp" as "Last Check", "ResultRecordedTime" as "Next Check"&lt;BR /&gt;|fillnull value="N/A"&lt;BR /&gt;|search $ResourceName$ $Services$ $Status$&amp;lt;/query&amp;gt;&lt;BR /&gt;&amp;lt;earliest&amp;gt;$earliest$&amp;lt;/earliest&amp;gt;&lt;BR /&gt;&amp;lt;latest&amp;gt;$latest$&amp;lt;/latest&amp;gt;&lt;BR /&gt;&amp;lt;/search&amp;gt;&lt;BR /&gt;&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="drilldown"&amp;gt;row&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="Status"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;drilldown&amp;gt;&lt;BR /&gt;&amp;lt;condition match="$Services$ != &amp;amp;quot;s3-bucket&amp;amp;quot;"&amp;gt;&lt;BR /&gt;&amp;lt;set token="Services"&amp;gt;s3-bucket&amp;lt;/set&amp;gt;&lt;BR /&gt;&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;S3_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;condition match="$Services$ != &amp;amp;quot;vpc&amp;amp;quot;"&amp;gt;&lt;BR /&gt;&amp;lt;set token="Services"&amp;gt;vpc&amp;lt;/set&amp;gt;&lt;BR /&gt;&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;VPC_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;condition match="$Services$ != &amp;amp;quot;ec2&amp;amp;quot;"&amp;gt;&lt;BR /&gt;&amp;lt;set token="Services"&amp;gt;ec2&amp;lt;/set&amp;gt;&lt;BR /&gt;&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;EC2_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;BR /&gt;&amp;lt;/drilldown&amp;gt;&lt;BR /&gt;&amp;lt;/table&amp;gt;&lt;BR /&gt;&amp;lt;/panel&amp;gt;&lt;BR /&gt;&amp;lt;/row&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The drilldown is supposed to ‘point’ to a second dashboard in the following way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;lt;/panel&amp;gt;&lt;BR /&gt;&amp;lt;panel depends="$VPC_details$"&amp;gt;&lt;BR /&gt;&amp;lt;title&amp;gt;VPC DETAILS : ShortConfigRuleName=$ShortConfigRuleName$ Service=$Services$&amp;lt;/title&amp;gt;&lt;BR /&gt;&amp;lt;table&amp;gt;&lt;BR /&gt;&amp;lt;search&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"&lt;BR /&gt;| search ShortConfigRuleName=$ShortConfigRuleName$&lt;BR /&gt;|search AccountId=$AccountId$&lt;BR /&gt;|search ComplianceType=$Status$&lt;BR /&gt;| eval Services = case(&lt;BR /&gt;match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",&lt;BR /&gt;match(ShortConfigRuleName, "iam-password"), "iam-password",&lt;BR /&gt;match(ShortConfigRuleName, "iam-policy"), "iam-policy",&lt;BR /&gt;match(ShortConfigRuleName, "iam-user"), "iam-user",&lt;BR /&gt;match(ShortConfigRuleName, "guardduty"), "guardduty",&lt;BR /&gt;match(ShortConfigRuleName, "ec2"), "ec2",&lt;BR /&gt;match(ShortConfigRuleName, "vpc"), "vpc",&lt;BR /&gt;match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",&lt;BR /&gt;match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",&lt;BR /&gt;match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",&lt;BR /&gt;match(ShortConfigRuleName, "subnet"), "subnet",&lt;BR /&gt;match(ShortConfigRuleName, "lambda-function"), "lambda-function",&lt;BR /&gt;1=1, "Other")&lt;BR /&gt;| where ResourceName!="N/A"&lt;BR /&gt;| table AccountId ResourceName Services ComplianceType&lt;BR /&gt;|rename ResourceName as "InstanceName"&lt;BR /&gt;| table AccountId Services ComplianceType&lt;BR /&gt;| dedup AccountId Services ComplianceType&lt;BR /&gt;|appendcols&lt;BR /&gt;[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$&lt;BR /&gt;|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]&lt;BR /&gt;| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;&lt;BR /&gt;&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;&lt;BR /&gt;&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;&lt;BR /&gt;&amp;lt;/search&amp;gt;&lt;BR /&gt;&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="ComplianceType"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="State"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;drilldown&amp;gt;&lt;BR /&gt;&amp;lt;condition&amp;gt;&lt;BR /&gt;&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;&lt;BR /&gt;&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;BR /&gt;&amp;lt;/drilldown&amp;gt;&lt;BR /&gt;&amp;lt;/table&amp;gt;&lt;BR /&gt;&amp;lt;/panel&amp;gt;&lt;BR /&gt;&amp;lt;panel depends="$EC2_details$"&amp;gt;&lt;BR /&gt;&amp;lt;title&amp;gt;EC2 DETAILS : ShortConfigRuleName=$ShortConfigRuleName$ Service=$Services$&amp;lt;/title&amp;gt;&lt;BR /&gt;&amp;lt;table&amp;gt;&lt;BR /&gt;&amp;lt;search&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"&lt;BR /&gt;| search ShortConfigRuleName=$ShortConfigRuleName$&lt;BR /&gt;|search AccountId=$AccountId$&lt;BR /&gt;|search ComplianceType=$Status$&lt;BR /&gt;| eval Services = case(&lt;BR /&gt;match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",&lt;BR /&gt;match(ShortConfigRuleName, "iam-password"), "iam-password",&lt;BR /&gt;match(ShortConfigRuleName, "iam-policy"), "iam-policy",&lt;BR /&gt;match(ShortConfigRuleName, "iam-user"), "iam-user",&lt;BR /&gt;match(ShortConfigRuleName, "guardduty"), "guardduty",&lt;BR /&gt;match(ShortConfigRuleName, "ec2"), "ec2",&lt;BR /&gt;match(ShortConfigRuleName, "vpc"), "vpc",&lt;BR /&gt;match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",&lt;BR /&gt;match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",&lt;BR /&gt;match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",&lt;BR /&gt;match(ShortConfigRuleName, "subnet"), "subnet",&lt;BR /&gt;match(ShortConfigRuleName, "lambda-function"), "lambda-function",&lt;BR /&gt;1=1, "Other")&lt;BR /&gt;| where ResourceName!="N/A"&lt;BR /&gt;| table AccountId ResourceName Services ComplianceType&lt;BR /&gt;|rename ResourceName as "InstanceName"&lt;BR /&gt;| table AccountId Services ComplianceType&lt;BR /&gt;| dedup AccountId Services ComplianceType&lt;BR /&gt;|appendcols&lt;BR /&gt;[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$&lt;BR /&gt;|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]&lt;BR /&gt;| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;&lt;BR /&gt;&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;&lt;BR /&gt;&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;&lt;BR /&gt;&amp;lt;/search&amp;gt;&lt;BR /&gt;&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="ComplianceType"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="State"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;drilldown&amp;gt;&lt;BR /&gt;&amp;lt;condition&amp;gt;&lt;BR /&gt;&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;&lt;BR /&gt;&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;BR /&gt;&amp;lt;/drilldown&amp;gt;&lt;BR /&gt;&amp;lt;/table&amp;gt;&lt;BR /&gt;&amp;lt;/panel&amp;gt;&lt;BR /&gt;&amp;lt;panel depends="$SERVICES_details$"&amp;gt;&lt;BR /&gt;&amp;lt;title&amp;gt;SERVICES DETAILS : ShortConfigRuleName=$ShortConfigRuleName$ Service=$Services$&amp;lt;/title&amp;gt;&lt;BR /&gt;&amp;lt;table&amp;gt;&lt;BR /&gt;&amp;lt;search&amp;gt;&lt;BR /&gt;&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"&lt;BR /&gt;| search ShortConfigRuleName=$ShortConfigRuleName$&lt;BR /&gt;|search AccountId=$AccountId$&lt;BR /&gt;|search ComplianceType=$Status$&lt;BR /&gt;| eval Services = case(&lt;BR /&gt;match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",&lt;BR /&gt;match(ShortConfigRuleName, "iam-password"), "iam-password",&lt;BR /&gt;match(ShortConfigRuleName, "iam-policy"), "iam-policy",&lt;BR /&gt;match(ShortConfigRuleName, "iam-user"), "iam-user",&lt;BR /&gt;match(ShortConfigRuleName, "guardduty"), "guardduty",&lt;BR /&gt;match(ShortConfigRuleName, "ec2"), "ec2",&lt;BR /&gt;match(ShortConfigRuleName, "vpc"), "vpc",&lt;BR /&gt;match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",&lt;BR /&gt;match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",&lt;BR /&gt;match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",&lt;BR /&gt;match(ShortConfigRuleName, "subnet"), "subnet",&lt;BR /&gt;match(ShortConfigRuleName, "lambda-function"), "lambda-function",&lt;BR /&gt;1=1, "Other")&lt;BR /&gt;| where ResourceName!="N/A"&lt;BR /&gt;| table AccountId ResourceName Services ComplianceType&lt;BR /&gt;|rename ResourceName as "InstanceName"&lt;BR /&gt;| table AccountId Services ComplianceType&lt;BR /&gt;| dedup AccountId Services ComplianceType&lt;BR /&gt;|appendcols&lt;BR /&gt;[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$&lt;BR /&gt;|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]&lt;BR /&gt;| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;&lt;BR /&gt;&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;&lt;BR /&gt;&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;&lt;BR /&gt;&amp;lt;/search&amp;gt;&lt;BR /&gt;&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="ComplianceType"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;format type="color" field="State"&amp;gt;&lt;BR /&gt;&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;&lt;BR /&gt;&amp;lt;/format&amp;gt;&lt;BR /&gt;&amp;lt;drilldown&amp;gt;&lt;BR /&gt;&amp;lt;condition&amp;gt;&lt;BR /&gt;&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;&lt;BR /&gt;&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;&lt;BR /&gt;&amp;lt;/condition&amp;gt;&lt;BR /&gt;&amp;lt;/drilldown&amp;gt;&lt;BR /&gt;&amp;lt;/table&amp;gt;&lt;BR /&gt;&amp;lt;/panel&amp;gt;&lt;BR /&gt;&amp;lt;/row&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When s3-bucket is selected, we point to the ‘S3_details’ panel, and so on&lt;/P&gt;&lt;P&gt;The link target works fine, but it's the click value at the beginning with the service selection that doesn't work&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 05:33:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706186#M239011</guid>
      <dc:creator>anissabnk</dc:creator>
      <dc:date>2024-12-10T05:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706289#M239029</link>
      <description>&lt;P&gt;Do you mean in the second dashboard, there are inputs which are not selected as you wanted?&lt;/P&gt;&lt;P&gt;If so, it's probably because the input token is named form.xxx, so if your input dropdown for Services is the token &lt;STRONG&gt;ShortConfigRuleName&lt;/STRONG&gt;, then you should pass the URL with&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;form.ShortConfigRuleName=$row.ShortConfigRuleName$&lt;/LI-CODE&gt;</description>
      <pubDate>Sun, 08 Dec 2024 22:31:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706289#M239029</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-12-08T22:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706386#M239054</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Than your for your answer but it doesn't work.&lt;/P&gt;
&lt;P&gt;panel 1 :&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;row&amp;gt;
&amp;lt;panel&amp;gt;
&amp;lt;title&amp;gt;AWS Services Monitoring&amp;lt;/title&amp;gt;
&amp;lt;table&amp;gt;
&amp;lt;search&amp;gt;
&amp;lt;!--done&amp;gt;
&amp;lt;set token="Services"&amp;gt;$click.name$&amp;lt;/set&amp;gt;
&amp;lt;/done--&amp;gt;
&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd" sourcetype="aws:s3:csv" ShortConfigRuleName="*"
| eval Services = case(
match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",
match(ShortConfigRuleName, "iam-password"), "iam-password",
match(ShortConfigRuleName, "iam-policy"), "iam-policy",
match(ShortConfigRuleName, "iam-user"), "iam-user",
match(ShortConfigRuleName, "guardduty"), "guardduty",
match(ShortConfigRuleName, "ec2"), "ec2",
match(ShortConfigRuleName, "vpc"), "vpc",
match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",
match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",
match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",
match(ShortConfigRuleName, "subnet"), "subnet",
match(ShortConfigRuleName, "lambda-function"), "lambda-function",
1=1, "Other")
|search Services!=Other
| lookup aws_security_all_account_ids account_id AS AccountId OUTPUT name
| table name AccountId Services ShortConfigRuleName ComplianceType OrderingTimestamp ResultRecordedTime
| dedup AccountId Services ShortConfigRuleName ComplianceType | rename name as "AWS Account Name", "ComplianceType" as "Status", "OrderingTimestamp" as "Last Check", "ResultRecordedTime" as "Next Check"
|fillnull value="N/A"
|search $ResourceName$ $Services$ $Status$&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;$earliest$&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;$latest$&amp;lt;/latest&amp;gt;
&amp;lt;/search&amp;gt;
&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;
&amp;lt;option name="drilldown"&amp;gt;row&amp;lt;/option&amp;gt;
&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
&amp;lt;option name="wrap"&amp;gt;true&amp;lt;/option&amp;gt;
&amp;lt;format type="color" field="Status"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;drilldown&amp;gt;
&amp;lt;condition match="$row.Services$ != &amp;amp;quot;s3-bucket&amp;amp;quot;"&amp;gt;
&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;S3_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;condition match="$row.Services$ != &amp;amp;quot;vpc&amp;amp;quot;"&amp;gt;
&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;VPC_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;condition match="$row.Services$ != &amp;amp;quot;ec2&amp;amp;quot;"&amp;gt;
&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;EC2_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;/drilldown&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;/row&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;panel 2:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;row&amp;gt;
&amp;lt;panel depends="$S3_details$"&amp;gt;
&amp;lt;title&amp;gt;S3 DETAILS : $row.Services$ $click.name2$ $click.value$ $click.value$ $click.value3$ $click.Services$&amp;lt;/title&amp;gt;
&amp;lt;table&amp;gt;
&amp;lt;search&amp;gt;
&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"
| search ShortConfigRuleName=$ShortConfigRuleName$
|search AccountId=$AccountId$
|search ComplianceType=$Status$
| eval Services = case(
match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",
match(ShortConfigRuleName, "iam-password"), "iam-password",
match(ShortConfigRuleName, "iam-policy"), "iam-policy",
match(ShortConfigRuleName, "iam-user"), "iam-user",
match(ShortConfigRuleName, "guardduty"), "guardduty",
match(ShortConfigRuleName, "ec2"), "ec2",
match(ShortConfigRuleName, "vpc"), "vpc",
match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",
match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",
match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",
match(ShortConfigRuleName, "subnet"), "subnet",
match(ShortConfigRuleName, "lambda-function"), "lambda-function",
1=1, "Other")
| where ResourceName!="N/A"
| table AccountId ResourceName Services ComplianceType
|rename ResourceName as "InstanceName"
| table AccountId Services ComplianceType
| dedup AccountId Services ComplianceType
|appendcols
[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$
|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]
| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;
&amp;lt;/search&amp;gt;
&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;
&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;
&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
&amp;lt;format type="color" field="ComplianceType"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;format type="color" field="State"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;drilldown&amp;gt;
&amp;lt;condition&amp;gt;
&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;
&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;/drilldown&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;panel depends="$VPC_details$"&amp;gt;
&amp;lt;title&amp;gt;VPC DETAILS : $row.Services$ $click.name2$ $click.value$ $click.value$ $click.value3$ $click.Services$&amp;lt;/title&amp;gt;
&amp;lt;table&amp;gt;
&amp;lt;search&amp;gt;
&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"
| search ShortConfigRuleName=$ShortConfigRuleName$
|search AccountId=$AccountId$
|search ComplianceType=$Status$
| eval Services = case(
match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",
match(ShortConfigRuleName, "iam-password"), "iam-password",
match(ShortConfigRuleName, "iam-policy"), "iam-policy",
match(ShortConfigRuleName, "iam-user"), "iam-user",
match(ShortConfigRuleName, "guardduty"), "guardduty",
match(ShortConfigRuleName, "ec2"), "ec2",
match(ShortConfigRuleName, "vpc"), "vpc",
match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",
match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",
match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",
match(ShortConfigRuleName, "subnet"), "subnet",
match(ShortConfigRuleName, "lambda-function"), "lambda-function",
1=1, "Other")
| where ResourceName!="N/A"
| table AccountId ResourceName Services ComplianceType
|rename ResourceName as "InstanceName"
| table AccountId Services ComplianceType
| dedup AccountId Services ComplianceType
|appendcols
[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$
|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]
| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;
&amp;lt;/search&amp;gt;
&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;
&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;
&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
&amp;lt;format type="color" field="ComplianceType"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;format type="color" field="State"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;drilldown&amp;gt;
&amp;lt;condition&amp;gt;
&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;
&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;/drilldown&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;panel depends="$EC2_details$"&amp;gt;
&amp;lt;title&amp;gt;EC2 DETAILS : $row.Services$ $click.name2$ $click.value$ $click.value$ $click.value3$ $click.Services$&amp;lt;/title&amp;gt;
&amp;lt;table&amp;gt;
&amp;lt;search&amp;gt;
&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"
| search ShortConfigRuleName=$ShortConfigRuleName$
|search AccountId=$AccountId$
|search ComplianceType=$Status$
| eval Services = case(
match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",
match(ShortConfigRuleName, "iam-password"), "iam-password",
match(ShortConfigRuleName, "iam-policy"), "iam-policy",
match(ShortConfigRuleName, "iam-user"), "iam-user",
match(ShortConfigRuleName, "guardduty"), "guardduty",
match(ShortConfigRuleName, "ec2"), "ec2",
match(ShortConfigRuleName, "vpc"), "vpc",
match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",
match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",
match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",
match(ShortConfigRuleName, "subnet"), "subnet",
match(ShortConfigRuleName, "lambda-function"), "lambda-function",
1=1, "Other")
| where ResourceName!="N/A"
| table AccountId ResourceName Services ComplianceType
|rename ResourceName as "InstanceName"
| table AccountId Services ComplianceType
| dedup AccountId Services ComplianceType
|appendcols
[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$
|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]
| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;
&amp;lt;/search&amp;gt;
&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;
&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;
&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
&amp;lt;format type="color" field="ComplianceType"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;format type="color" field="State"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;drilldown&amp;gt;
&amp;lt;condition&amp;gt;
&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;
&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;/drilldown&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;panel depends="$SERVICES_details$"&amp;gt;
&amp;lt;title&amp;gt;SERVICES DETAILS : $row.Services$ $click.name2$ $click.value$ $click.value$ $click.value3$ $click.Services$&amp;lt;/title&amp;gt;
&amp;lt;table&amp;gt;
&amp;lt;search&amp;gt;
&amp;lt;query&amp;gt;index="aws_vpc_corp-it_security-prd"
| search ShortConfigRuleName=$ShortConfigRuleName$
|search AccountId=$AccountId$
|search ComplianceType=$Status$
| eval Services = case(
match(ShortConfigRuleName, "s3-bucket"), "s3-bucket",
match(ShortConfigRuleName, "iam-password"), "iam-password",
match(ShortConfigRuleName, "iam-policy"), "iam-policy",
match(ShortConfigRuleName, "iam-user"), "iam-user",
match(ShortConfigRuleName, "guardduty"), "guardduty",
match(ShortConfigRuleName, "ec2"), "ec2",
match(ShortConfigRuleName, "vpc"), "vpc",
match(ShortConfigRuleName, "ebs-snapshot"), "ebs-snapshot",
match(ShortConfigRuleName, "rds-snapshots"), "rds-snapshots",
match(ShortConfigRuleName, "cloudtrail"), "cloudtrail",
match(ShortConfigRuleName, "subnet"), "subnet",
match(ShortConfigRuleName, "lambda-function"), "lambda-function",
1=1, "Other")
| where ResourceName!="N/A"
| table AccountId ResourceName Services ComplianceType
|rename ResourceName as "InstanceName"
| table AccountId Services ComplianceType
| dedup AccountId Services ComplianceType
|appendcols
[ search index="aws_vpc_corp-it_security-prd" source="s3://vwt-s3-secuprod-*" |search AccountId=$AccountId$
|table InstanceId InstanceName Platform State |dedup InstanceId InstanceName Platform State]
| table AccountId Services ComplianceType InstanceId InstanceName Platform State&amp;lt;/query&amp;gt;
&amp;lt;earliest&amp;gt;$field1.earliest$&amp;lt;/earliest&amp;gt;
&amp;lt;latest&amp;gt;$field1.latest$&amp;lt;/latest&amp;gt;
&amp;lt;/search&amp;gt;
&amp;lt;option name="count"&amp;gt;100&amp;lt;/option&amp;gt;
&amp;lt;option name="drilldown"&amp;gt;cell&amp;lt;/option&amp;gt;
&amp;lt;option name="refresh.display"&amp;gt;progressbar&amp;lt;/option&amp;gt;
&amp;lt;format type="color" field="ComplianceType"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"NON_COMPLIANT":#D94E17}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;format type="color" field="State"&amp;gt;
&amp;lt;colorPalette type="map"&amp;gt;{"stopped":#D94E17,"running":#55C169}&amp;lt;/colorPalette&amp;gt;
&amp;lt;/format&amp;gt;
&amp;lt;drilldown&amp;gt;
&amp;lt;condition&amp;gt;
&amp;lt;!-- Vérifiez que le filtre correspond exactement au service sélectionné --&amp;gt;
&amp;lt;eval token="S3_details"&amp;gt;if(match($click.value$, "s3-bucket"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="VPC_details"&amp;gt;if(match($click.value$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;eval token="EC2_details"&amp;gt;if(match($click.value$, "ec2"), "true", "false")&amp;lt;/eval&amp;gt;
&amp;lt;/condition&amp;gt;
&amp;lt;/drilldown&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;/row&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;But it does'nt work, when I select the vpc filter, I arrive at the S3_details view, instead of arriving at VPC_details when I select the s3-bucket filter, I go to VPC_details instead of S3_details&lt;BR /&gt;when I select the ec2 filter, I end up on S3_details instead of EC2_details&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 22:24:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706386#M239054</guid>
      <dc:creator>anissabnk</dc:creator>
      <dc:date>2024-12-09T22:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706432#M239056</link>
      <description>&lt;P&gt;Look at your condition match statements, e.g. your first one does&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;condition match="$row.Services$ != &amp;amp;quot;s3-bucket&amp;amp;quot;"&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;and then it sets S3_details="true"&lt;/P&gt;&lt;P&gt;same for VPC and the other. So you probably want to change your matches to = rather than !=&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 23:43:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706432#M239056</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-12-09T23:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706449#M239059</link>
      <description>&lt;LI-CODE lang="markup"&gt;&amp;lt;condition match="$Services$ == &amp;amp;quot;vpc&amp;amp;quot;"&amp;gt; &amp;lt;/condition&amp;gt;
&amp;lt;!--eval token="VPC_details"&amp;gt;if(match($Services$, "vpc"), "true", "false")&amp;lt;/eval&amp;gt;

&amp;lt;set token="VPC_details"&amp;gt;&amp;lt;/set&amp;gt;
&amp;lt;unset token="S3_details"&amp;gt;&amp;lt;/unset&amp;gt;
&amp;lt;unset token="EC2_details"&amp;gt;&amp;lt;/unset--&amp;gt;
&amp;lt;condition&amp;gt;
&amp;lt;link target="_blank"&amp;gt;/app/search/dev_vwt_dashboards_uc48_details?ShortConfigRuleName=$row.ShortConfigRuleName$&amp;amp;amp;AccountId=$row.AccountId$&amp;amp;amp;Services=$row.Services$&amp;amp;amp;VPC_details=true&amp;amp;amp;earliest=$earliest$&amp;amp;amp;latest=$latest$&amp;amp;amp;Status=$row.Status$&amp;lt;/link&amp;gt;

&amp;lt;/condition&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I tried this but it doesn't work&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 15:13:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706449#M239059</guid>
      <dc:creator>anissabnk</dc:creator>
      <dc:date>2024-12-10T15:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706510#M239077</link>
      <description>&lt;P&gt;Why did you do that? That's different to what you originally posted as well as changing the != to ==&lt;/P&gt;&lt;P&gt;Your original posted attempt was this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;condition match="$row.Services$ != &amp;amp;quot;vpc&amp;amp;quot;"&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;You just tried this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;condition match="$Services$ == &amp;amp;quot;vpc&amp;amp;quot;"&amp;gt; &amp;lt;/condition&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;You changed both the match token AND the comparator.&lt;/P&gt;&lt;P&gt;You only need to change the comparator - it works fine.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 02:30:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706510#M239077</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2024-12-11T02:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: condition drilldown - with link target</title>
      <link>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706635#M239118</link>
      <description>&lt;P&gt;This : &amp;lt;condition match="$row.Services$ == &amp;amp;quot;s3-bucket&amp;amp;quot;"&amp;gt; works fine&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 10:46:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/condition-drilldown-with-link-target/m-p/706635#M239118</guid>
      <dc:creator>anissabnk</dc:creator>
      <dc:date>2024-12-12T10:46:48Z</dc:date>
    </item>
  </channel>
</rss>

