All Apps and Add-ons

Palo Alto Networks App for Splunk: Why is the "Threat Subtypes" panel on the "Threat dashboard" showing incomplete data?

vsingla1
Communicator

On the "Threat Dashboard", under "Threat Subtypes" chart panel, I clicked on the subsearch and below is the search returned:

| `tstats` count FROM `node(log.threat)`    `groupby(_time log.log_subtype)` | timechart values(count) by log_subtype

But this panel/subsearch shows incomplete information. When searching for past 7 days from 11/17, the data is returned for date beyond 11/12. There is no data for date between 11/13 and 11/17. It is really not possible. When I check raw events under sourcetype=pan_threat, I see continuous streaming of data.

Why is data not showing in the panel/dashboard, BUT showing in the raw events?

0 Karma

btorresgil
Builder

I can't think of anything in the app itself that would cause this problem. The dashboard leverages the datamodel acceleration features of Splunk 6, so if the datamodel acceleration is not up-to-date, you could find data missing for some time periods. But I find it strange that you see data for time periods you aren't even requesting. One suggestions is to re-install the app, since a customization in the props or transforms might cause the logs needed to populate this panel to be misinterpreted. Another suggestions is to ensure your time and timezones match on all firewalls and Splunk nodes and that the timestamp on the logs is being interpreted correctly by Splunk.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...