Splunk Enterprise Security

Need changes to the datamodel search

AL3Z
Builder

Hi,

I aimed to merge the "dropped" and "blocked" values under the "IDS_Attacks.action" field in the output of the datamodel search and include their respective counts within the newly created "blocked" field.

so that I can add it to the dashboard.
output:

 


IDS_Attacks.action
count

allowed130016
blocked595
dropped1123
Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I strongly advise against modifying datamodels that are not your own.  If you change a DM, your changes will override any future versions of the DM that may be released.

Instead, have your dashboard combine the values by changing "dropped" to "blocked".

| eval IDS_Attacks.action=if(IDS_Attacks.action="dropped","blocked",IDS_Attacks.action)

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

Hi,

Why I'm not seeing the field IDS_Attacks.sourcetype field in the datamodel  ? 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I don't know why you're not seeing the sourcetype field.  Every event should have that field.

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

May be the taging is not done it in a right way. Where we need to check further?

0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...