Splunk Cloud Platform

Why is drilldown on dashboard not working properly?

jhilton90
Path Finder

I have a dashboard which displays information about password resets and I have a bar chart showing the top 20 accounts that have reset their passwords, code as follows:

 

 

 

index=keycloak "fields.environment"=production redirect_uri=* type=UPDATE_PASSWORD 
| rename customerReferenceAccountId as AccountID | top AccountID limit=20

 

 

 

This displays as a bar chat absolutely fine, however what I'm trying to achieve is to be able to click one of the bars in this chart, which will then display a table with AccountID, username, userId, redirect_uri, ipAddress, _time. Code as follows:

 

 

 

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID$ type=UPDATE_PASSWORD 
| table $AccountID$, username, userId, redirect_uri, ipAddress, _time

 

 

 

In the first table I have set the "On Click" with a value of "Manage tokens on this dashboard" as follows: Set AccountID = $click.value$.

However, when I click on one of the bars, the table below isn't displaying any information, I just get "No results found" but I know that there are results

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try this

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID|s$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time

View solution in original post

0 Karma

woodcock
Esteemed Legend

Run the dashboard.
Click "Edit".
Scroll to your panel.
In the upper-right corner, click on the snowman menu and select "Edit Drilldown".
In the popup that opens, select "Link to Search".
In the redrawn popup, select, "Custom".
Paste this in it: index="keycloak" AND fields.environment="production" AND customerReferenceAccountId="$click.value$" AND type="UPDATE_PASSWORD" | table AccountID, username, userId, redirect_uri, ipAddress, _time
Or maybe something like this: |inputlookup foo WHERE AccountID="$click.value$"
Save it all.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time
0 Karma

jhilton90
Path Finder

That doesn't work I'm afraid

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID|s$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time
0 Karma

jhilton90
Path Finder

Isn't that the same? I tried it but it didn't work

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

No, it uses |s to make the token a string - without more detail on what your events look like and what exactly isn't working, it is a little difficult to make other suggestions. If you want more help, please provide more detail on what your issues are

0 Karma

jhilton90
Path Finder

No it's okay you were right, I had a typo

Thanks!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...