Archive
Highlighted

Is there a way to set a drill down on a dashboard to only show the selected event?

New Member

I have search query in a form that displays the average and max value for the processing time. However, when I Drilldown on the Max value I see all the events with the search rather than just one value. Is there a way to only show the maximum value? below is a sample output and query

....| rex field=_index ".payload number.(?.)completed.in\s(?.\d+)ms(?.\w+)" | eval TimeSec=round(ProcessingTime/1000,0) | stats count(PayloadID) as Payloads avg(TimeSec) as "AvgSec" max(TimeSec) as "Max Sec" BY Account | where Payloads > 1000 | eval "AvgSec"=round(AvgSec, 1) | rename AvgSec as "Avg Sec" |sort "Avg Sec" desc

Account Payloads    Avg Sec Max Sec

1 99260697 6485 812.1 2805
2 97038373 1632 383.2 662
3 29490911 23394 357.2 926
4 36156294 1046 341.2 528

0 Karma
Highlighted

Re: Is there a way to set a drill down on a dashboard to only show the selected event?

SplunkTrust
SplunkTrust

what is your drill-down search query? means when you click on that value what query you get?
also, put your query in 101010 sample code in order to avoid escape characters in query.

0 Karma
Highlighted

Re: Is there a way to set a drill down on a dashboard to only show the selected event?

Contributor

Hi @kaphie2002,
You can check below link it might help you with your issue.
http://docs.splunk.com/Documentation/Splunk/6.2.0/Viz/Dynamicdrilldownindashboardsandforms
Also check accepted answer in below splunk answers.
https://answers.splunk.com/answers/187472/is-it-possible-to-create-a-dynamic-drilldown-on-sp.html

0 Karma
Highlighted

Re: Is there a way to set a drill down on a dashboard to only show the selected event?

Legend

Hi kaphie2002,
you could pass in drilldown one or more tokens (e.g. Account) and then create your search in the secondary dashbord filtering for the maximum value, something like this in the secondary dashboard

secondary_search Account=$account$
| rex field=_index ".payload number.(?.)completed.in\s(?.\d+)ms(?.\w+)" 
| eval TimeSec=round(ProcessingTime/1000,0) 
| stats count(PayloadID) as Payloads avg(TimeSec) as "AvgSec" max(TimeSec) as "Max Sec" BY Account 
| where Payloads > 1000 
| sort  "Max Sec" desc
| head 1
| eval "AvgSec"=round(AvgSec, 1) 
| rename AvgSec as "Avg Sec" 

if you want more information, add other fields as values in the stats command.

Bye.
Giuseppe

0 Karma