Splunk Cloud Platform

Why is drilldown on dashboard not working properly?

jhilton90
Path Finder

I have a dashboard which displays information about password resets and I have a bar chart showing the top 20 accounts that have reset their passwords, code as follows:

 

 

 

index=keycloak "fields.environment"=production redirect_uri=* type=UPDATE_PASSWORD 
| rename customerReferenceAccountId as AccountID | top AccountID limit=20

 

 

 

This displays as a bar chat absolutely fine, however what I'm trying to achieve is to be able to click one of the bars in this chart, which will then display a table with AccountID, username, userId, redirect_uri, ipAddress, _time. Code as follows:

 

 

 

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID$ type=UPDATE_PASSWORD 
| table $AccountID$, username, userId, redirect_uri, ipAddress, _time

 

 

 

In the first table I have set the "On Click" with a value of "Manage tokens on this dashboard" as follows: Set AccountID = $click.value$.

However, when I click on one of the bars, the table below isn't displaying any information, I just get "No results found" but I know that there are results

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try this

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID|s$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time

View solution in original post

0 Karma

woodcock
Esteemed Legend

Run the dashboard.
Click "Edit".
Scroll to your panel.
In the upper-right corner, click on the snowman menu and select "Edit Drilldown".
In the popup that opens, select "Link to Search".
In the redrawn popup, select, "Custom".
Paste this in it: index="keycloak" AND fields.environment="production" AND customerReferenceAccountId="$click.value$" AND type="UPDATE_PASSWORD" | table AccountID, username, userId, redirect_uri, ipAddress, _time
Or maybe something like this: |inputlookup foo WHERE AccountID="$click.value$"
Save it all.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time
0 Karma

jhilton90
Path Finder

That doesn't work I'm afraid

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

index=keycloak "fields.environment"=production customerReferenceAccountId=$AccountID|s$ type=UPDATE_PASSWORD 
| table customerReferenceAccountId, username, userId, redirect_uri, ipAddress, _time
0 Karma

jhilton90
Path Finder

Isn't that the same? I tried it but it didn't work

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

No, it uses |s to make the token a string - without more detail on what your events look like and what exactly isn't working, it is a little difficult to make other suggestions. If you want more help, please provide more detail on what your issues are

0 Karma

jhilton90
Path Finder

No it's okay you were right, I had a typo

Thanks!

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...