Dashboards & Visualizations

Question about search

nebel
Communicator

Hi,

I built a search like this

sourcetype=firewall rule=100 | search drop OR accept | head 1

This shows my only the last event (drop or accept).

Now I want to visualize with a colored single value field. For "drop" it should going red, for accept it should going green.

How can I realize that?

Thank you very much!

Regards

Tags (3)
0 Karma
1 Solution

Drainy
Champion

Further to Ayns answer, you don't need to do a | search after your searchterms, they are all search terms. Just do a sourcetype=firewall rule=100 drop OR accept | head etc

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...