Dashboards & Visualizations

Question about search

nebel
Communicator

Hi,

I built a search like this

sourcetype=firewall rule=100 | search drop OR accept | head 1

This shows my only the last event (drop or accept).

Now I want to visualize with a colored single value field. For "drop" it should going red, for accept it should going green.

How can I realize that?

Thank you very much!

Regards

Tags (3)
0 Karma
1 Solution

Drainy
Champion

Further to Ayns answer, you don't need to do a | search after your searchterms, they are all search terms. Just do a sourcetype=firewall rule=100 drop OR accept | head etc

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...