Dashboards & Visualizations

Set Token which is not in the result of search

tdoSplunk
Path Finder

Hi,

I want to create a simple list in my dashboard where I can see all assigned Apps(Only with one column, the AppName). The rows are clickable.
That was no problem, but my second requirement is to create a link to a dashboard of the clicked App.

To achieve this goal I created a search

  <query>|rest /servicesNS/-/-/data/ui/views 
|rename eai:appName as AppID, label as DashboardName, title as DashboardID
|search  DashboardID=*overview 
|join AppID [ | rest /services/apps/local |search label="$selectedApp$" |rename title as AppID| table AppID label ] 
|eval selectedApp=AppID, relatedDashboard=DashboardID
|table label</query>
          <finalized>
            <condition match=" $job.resultCount$ >= 1">
              <set token="tokselectedApp">$result.selectedApp$</set>
              <set token="tokrelatedDashboard">$result.relatedDashboard$</set>
            </condition>
          </finalized>
 </query>

The Tokens will be used to create the link

 <drilldown>
          <link target="_blank">../$tokselectedApp$/$tokrelatedDashboard$</link>
 </drilldown>

This Approach does only work when I modify the search to

<query>|rest /servicesNS/-/-/data/ui/views 
 |rename eai:appName as AppID, label as DashboardName, title as DashboardID
 |search  DashboardID=*overview 
 |join AppID [ | rest /services/apps/local |search label="$selectedApp$" |rename title as AppID| table AppID label ] 
 |eval selectedApp=AppID, relatedDashboard=DashboardID
 |table label, selectedApp, relatedDashboard</query>

But I do not want to have the fields selectedApp and relateddashboard in my results view.

Is the Approach completely wrong or how does it work?

Hope you can help me
best regards,
Thomas

Tags (1)
0 Karma
1 Solution

renjith_nair
Legend

@tdoSplunk,

You can use the underscore field name for that (_field)

Try this example where we dont want to see the source value in table but token is set with that and displayed in html panel.

<dashboard>
  <label>Token based Dashboard</label>
  <row>
    <panel>
      <table>
        <search>
          <query>index=_*| stats count by sourcetype,source|rename source as _source</query>
          <earliest>-5m</earliest>
          <latest>now</latest>
        </search>
        <option name="drilldown">cell</option>
        <option name="refresh.display">progressbar</option>
        <drilldown>
          <set token="my_token">$row._source$</set>
        </drilldown>
      </table>
    </panel>
  </row>
  <row>
    <html>
    <h1>Here is the value selected :  $my_token$</h1>
  </html>
  </row>
</dashboard>
---
What goes around comes around. If it helps, hit it with Karma :slightly_smiling_face:

View solution in original post

0 Karma

renjith_nair
Legend

@tdoSplunk,

You can use the underscore field name for that (_field)

Try this example where we dont want to see the source value in table but token is set with that and displayed in html panel.

<dashboard>
  <label>Token based Dashboard</label>
  <row>
    <panel>
      <table>
        <search>
          <query>index=_*| stats count by sourcetype,source|rename source as _source</query>
          <earliest>-5m</earliest>
          <latest>now</latest>
        </search>
        <option name="drilldown">cell</option>
        <option name="refresh.display">progressbar</option>
        <drilldown>
          <set token="my_token">$row._source$</set>
        </drilldown>
      </table>
    </panel>
  </row>
  <row>
    <html>
    <h1>Here is the value selected :  $my_token$</h1>
  </html>
  </row>
</dashboard>
---
What goes around comes around. If it helps, hit it with Karma :slightly_smiling_face:
0 Karma

tdoSplunk
Path Finder

Thank you very much. Works great for me!

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...