All Apps and Add-ons

Threat Subtypes Over Time only showing last 7 days

tomta1
New Member

Hi,

Using the Palo Alto Plugin with the PAN Extensions installed. On the Palo Alto Dashboard, when I change the default timeframe from 4 hours to 30 days, only the last 7 days are shown on the Threat Subtypes Over Time dashboard widget. When I do an index search of sourcetype = pan:threat I see entries for all 30 days.

Any ideas? Am I missing something?

Thanks in Advance

Tom

0 Karma

btorresgil
Builder

The firewalls generate a lot of data, so the App uses datamodel acceleration to speed up the dashboards. By default the acceleration timeframe is 7 days, so if you want more than 7 days of data to show up in dashboards, simply increase the acceleration timeframe on the datamodel. Note that increasing the acceleration timeframe will increase the disk usage for the accelerated data.

0 Karma

HiroshiSatoh
Champion

Is not the data model speeding up for seven days configuration?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...