Splunk Enterprise Security

Need changes to the datamodel search

AL3Z
Builder

Hi,

I aimed to merge the "dropped" and "blocked" values under the "IDS_Attacks.action" field in the output of the datamodel search and include their respective counts within the newly created "blocked" field.

so that I can add it to the dashboard.
output:

 


IDS_Attacks.action
count

allowed130016
blocked595
dropped1123
Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I strongly advise against modifying datamodels that are not your own.  If you change a DM, your changes will override any future versions of the DM that may be released.

Instead, have your dashboard combine the values by changing "dropped" to "blocked".

| eval IDS_Attacks.action=if(IDS_Attacks.action="dropped","blocked",IDS_Attacks.action)

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

Hi,

Why I'm not seeing the field IDS_Attacks.sourcetype field in the datamodel  ? 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I don't know why you're not seeing the sourcetype field.  Every event should have that field.

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

May be the taging is not done it in a right way. Where we need to check further?

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...