Splunk Search

How to set a field as the token to use in a dashboard?

surekhasplunk
Communicator

I have a search which will return me field email id.

index=snow description=*CPU*  |table number sys_created_by

number    sys_created_by
1234      abcd@bcd.com

Now i want to use sys_created_by field as the token to populate my dashboard

How to do this?

index=snow description=*CPU*  |where sys_created_by=$token$
1 Solution

nfilippi_splunk
Splunk Employee
Splunk Employee

You can use the search event handler to dynamically set a token based on the result. Note that the search event handler only tokenizes the first result, which looks like it should work for you.

Here's what it would look like:

<dashboard>
  <label>Test Token</label>

  <search>
    <query>index=snow description=CPU | table number sys_created_by</query>
    <earliest>-60m@m</earliest>
    <latest>now</latest>
    <done>
      <set token="sys_created_by">$result.sys_created_by$</set>
    </done>
  </search>

  <row>
    <panel>
      <table>
        <search>
          <query>index=snow description=CPU sys_created_by=$sys_created_by$</query>
          <earliest>-60m@m</earliest>
          <latest>now</latest>       
        </search>
      </table>
    </panel>
  </row>
</dashboard>

View solution in original post

nfilippi_splunk
Splunk Employee
Splunk Employee

You can use the search event handler to dynamically set a token based on the result. Note that the search event handler only tokenizes the first result, which looks like it should work for you.

Here's what it would look like:

<dashboard>
  <label>Test Token</label>

  <search>
    <query>index=snow description=CPU | table number sys_created_by</query>
    <earliest>-60m@m</earliest>
    <latest>now</latest>
    <done>
      <set token="sys_created_by">$result.sys_created_by$</set>
    </done>
  </search>

  <row>
    <panel>
      <table>
        <search>
          <query>index=snow description=CPU sys_created_by=$sys_created_by$</query>
          <earliest>-60m@m</earliest>
          <latest>now</latest>       
        </search>
      </table>
    </panel>
  </row>
</dashboard>

inventsekar
SplunkTrust
SplunkTrust

You can use the token directly inside the query.

  index=snow description=CPU |table number $token$
thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

surekhasplunk
Communicator

Thanks but how do I set the token to sys_created_by field first.
As after setting the token only I can use it like $token$

0 Karma

rodrigorsilva
Communicator

Hi,

Try to check the link below:

http://docs.splunk.com/Documentation/Splunk/6.5.0/Viz/tokens

tks

Rodrigo Ribeiro

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...