Splunk Search

help on link target token

jip31
Motivator

hello

I open a new drilldown window from my dashboard like this

 

 <drilldown>
          <link target="_blank">search?q=%60index_toto%60%20sourcetype%3D%22ez%3Acrash%22%20type%3D*%20%7C%20stats%20count%20as%20crash%20by%20host%20_time&amp;earliest=-7d@h&amp;latest=now</link></drilldown>

 

the exact search is

 

`index_toto` sourcetype="ez:crash" type=* | stats count as crash by host _time

 

I would like to add a token on the field host in order to display the results for this host in the new window results

could you help please?

 

Labels (1)
Tags (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Depending what you are trying to do in your search query, try something like this

 <drilldown>
          <link target="_blank">search?q=%60index_toto%60%20sourcetype%3D%22ez%3Acrash%22%20type%3D*%20host%3D%22$click.value$%22%20%7C%20stats%20count%20as%20crash%20by%20host%20_time&amp;earliest=-7d@h&amp;latest=now</link></drilldown>

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Depending what you are trying to do in your search query, try something like this

 <drilldown>
          <link target="_blank">search?q=%60index_toto%60%20sourcetype%3D%22ez%3Acrash%22%20type%3D*%20host%3D%22$click.value$%22%20%7C%20stats%20count%20as%20crash%20by%20host%20_time&amp;earliest=-7d@h&amp;latest=now</link></drilldown>
0 Karma

jip31
Motivator

ok perfect!

0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...