Splunk Search

Annotation based on Existing Value (to avoid duplicate search)

lennys26
Communicator

On an existing dashboard I have a rather complex query that generates a timechart on which I am looking to use annotations to highlight threshold breaches.

Is there any way to avoid having to run the same query twice (once to create the initial chart, and a second time for the annotations).

Oh -- [I think I have may be answering my own question,] is the answer here going to be to use a base search?

Thanks.

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Yes, a base search will be a good start.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Yes, a base search will be a good start.

---
If this reply helps you, Karma would be appreciated.

lennys26
Communicator

@richgalloway  - Thanks. I tend to shy away from base searches for some reason.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...