Splunk Enterprise Security

Need changes to the datamodel search

AL3Z
Builder

Hi,

I aimed to merge the "dropped" and "blocked" values under the "IDS_Attacks.action" field in the output of the datamodel search and include their respective counts within the newly created "blocked" field.

so that I can add it to the dashboard.
output:

 


IDS_Attacks.action
count

allowed130016
blocked595
dropped1123
Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I strongly advise against modifying datamodels that are not your own.  If you change a DM, your changes will override any future versions of the DM that may be released.

Instead, have your dashboard combine the values by changing "dropped" to "blocked".

| eval IDS_Attacks.action=if(IDS_Attacks.action="dropped","blocked",IDS_Attacks.action)

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

Hi,

Why I'm not seeing the field IDS_Attacks.sourcetype field in the datamodel  ? 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I don't know why you're not seeing the sourcetype field.  Every event should have that field.

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

May be the taging is not done it in a right way. Where we need to check further?

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...