<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create a dashboard to track alert results by severity level? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223971#M65968</link>
    <description>&lt;P&gt;Do you mean something like this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SEVERITY       ALERT          IPS
----------------------------------------
MAJOR          alert_1         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
               alert_2         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
MINOR          alert_3         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If not can you demonstrate the table you want to achieve? Also if you can post a sample of what your events look like that would help .&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2016 11:17:11 GMT</pubDate>
    <dc:creator>jplumsdaine22</dc:creator>
    <dc:date>2016-06-22T11:17:11Z</dc:date>
    <item>
      <title>How to create a dashboard to track alert results by severity level?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223970#M65967</link>
      <description>&lt;P&gt;I have multiple alerts, each at different severity levels. The output of these alerts are fields like source, destination IP, and user.&lt;/P&gt;

&lt;P&gt;If I want a dashboard that shows me the top 5 source IPs by severity by alert, for example - or anything other sort of 'count by (field) over (alert name) by (severity)' type logic - what are the Splunk mechanisms to do so?&lt;/P&gt;

&lt;P&gt;I can't map out in my mind what is the best way to get the alert NAME, alert RESULTS, and alert SEVERITY in one place that a user can search against on demand?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 17:18:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223970#M65967</guid>
      <dc:creator>yacht_rock</dc:creator>
      <dc:date>2016-06-21T17:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a dashboard to track alert results by severity level?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223971#M65968</link>
      <description>&lt;P&gt;Do you mean something like this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SEVERITY       ALERT          IPS
----------------------------------------
MAJOR          alert_1         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
               alert_2         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
MINOR          alert_3         192.168.1.1
                               192.168.1.2
                               192.168.1.3
                               192.168.1.4
                               192.168.1.5
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If not can you demonstrate the table you want to achieve? Also if you can post a sample of what your events look like that would help .&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 11:17:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223971#M65968</guid>
      <dc:creator>jplumsdaine22</dc:creator>
      <dc:date>2016-06-22T11:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a dashboard to track alert results by severity level?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223972#M65969</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;

&lt;P&gt;Yes, a table like that is exactly what I'm looking for. I was experimenting with a summary index via | collect index=alert_summary at the end of each alert's SPL, then using a data model to calculate a "severity" field based on search_name (the field 'search_name' is auto-added into the summary index along with my alert's results)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:01:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223972#M65969</guid>
      <dc:creator>yacht_rock</dc:creator>
      <dc:date>2020-09-29T10:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a dashboard to track alert results by severity level?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223973#M65970</link>
      <description>&lt;P&gt;Have you looked at this app? &lt;A href="https://splunkbase.splunk.com/app/2665/#/overview"&gt;https://splunkbase.splunk.com/app/2665/#/overview&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 21:38:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223973#M65970</guid>
      <dc:creator>sk314</dc:creator>
      <dc:date>2016-06-22T21:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a dashboard to track alert results by severity level?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223974#M65971</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex | stats values(IPS) as IPS by SEVERITY ALERT
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 23 Jun 2016 01:03:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-dashboard-to-track-alert-results-by-severity/m-p/223974#M65971</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-06-23T01:03:03Z</dc:date>
    </item>
  </channel>
</rss>

