Splunk Search

Field missing in statistical table only, while present (with values) in search

altink
Builder

Dear all,

I have a dashboard table that does not display certain fields, which do have data - although not in every row - for the period searched.

The fields missing in the dashboard table are "group" and "rule".
when clicking the dashboard loop button - search in a new form - they do appear

Splunk version is 6.4.4.

the code is below:

<form>
  <label>Cisco FW Change 02</label>
  <search id="mc_unf_base">
    <query>index=net_firewall sourcetype=cisco:asa vendor_class=config user="*" command="*"</query>
    <earliest>$field_time.earliest$</earliest>
    <latest>$field_time.latest$</latest>
  </search>
  <fieldset submitButton="false">
    <input type="time" token="field_time">
      <label></label>
      <default>
        <earliest>-24h@h</earliest>
        <latest>now</latest>
      </default>
    </input>
  </fieldset>
  <row>
    <panel>
      <table>
        <search base="mc_unf_base">
          <query>| table _time, host, user, src, group, rule, severity_level, command, change_description     
                 | rename host AS Firewall, user as User, src as "Client IP", severity_level as Severity</query>
        </search>
        <option name="wrap">false</option>
        <option name="rowNumbers">true</option>
        <option name="drilldown">row</option>
        <option name="dataOverlayMode">none</option>
        <option name="count">16</option>
      </table>
    </panel>
  </row>
</form>

best regards
Altin

Tags (1)
0 Karma
1 Solution

chrisyounger
SplunkTrust
SplunkTrust

Whenever you use a base search, you need to explicitly specify all fields that you need for later searches. So change your base search to this:

index=net_firewall sourcetype=cisco:asa vendor_class=config user="*" command="*"| fields _time, host, user, src, group, rule, severity_level, command, change_description

Secondly, using a base search without a summarising command is not ideal.

View solution in original post

chrisyounger
SplunkTrust
SplunkTrust

Whenever you use a base search, you need to explicitly specify all fields that you need for later searches. So change your base search to this:

index=net_firewall sourcetype=cisco:asa vendor_class=config user="*" command="*"| fields _time, host, user, src, group, rule, severity_level, command, change_description

Secondly, using a base search without a summarising command is not ideal.

altink
Builder

thank you very much @chrisyoungerjds

best regards
Altin

0 Karma

lakshman239
Influencer

Are you seeing them when you run your search in search window? Also, if there are more than 10 results, they would appear in the next page. hope you have checked that in the table results.

index=net_firewall sourcetype=cisco:asa vendor_class=config user="" command="" |fillnull value="N/A" group, rule | stats count by group, rule

0 Karma

altink
Builder

thank you,

but it is not a matter of pages. I do see them in search, but not in the statistical (dashboard) table

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...