Information related to footer removed
Remove benign warning messages when untarring the .spl file on a linux system.
Fixed an issue where the "Tag Cloud" custom visualizations were not rendering due to missing files.
What's New:
- Added compatibility with Splunk Enterprise v7.0
- Renamed app label to "Splunk Dashboard Examples" (support now extends beyond 6.x)
- Added example for new charting enhancements (new in v7.0)
- Added example for new event annotations (new in v7.0)
Fixed typo in Parallel Coordinates example.
What's New:
- Compatible with Splunk Enterprise v6.6
- Added example "Display Search Time Range" for displaying the earliest and latest time range in the element title or elsewhere
- Added example for advanced conditional matching using eval expressions
- Added example for trellis visualization layout (new in Splunk v6.6)
- Updated drilldown examples to reflect new capabilities via the drilldown ui editor (new in Splunk v6.6)
- Updated custom visualization examples to reflect the new 6.4 custom viz API
What's New:
- New example "Set tokens on page load" to leverage the new <init> token setter (new feature in Splunk 6.5)
- Updated "Custom token definitions" to leverage new global tokens now available via $env:foo$ (new feature in Splunk 6.5)
- Updated "Display Controls" to reflect new shorthand syntax for specifying this url arguments (new in Splunk 6.5)
- Updated "Eval Token Expressions" to reflect new consolidated search event handlers as progress+done (new in Splunk 6.5)
- Updated several table format examples to leverage new conditional table formatting feature (new feature in Splunk 6.5)
- New example "Search Refresh and Refresh Display" to leverage the new element refresh behavior support in dashboards (new feature in Splunk 6.5)
- Updated "Drilldown URL Field Value" example to reflect new token filter for "No Encoding" (new in Splunk 6.5)
What's New:
- New "Recursive Search Post process" example (new in Splunk v6.4)
- New "Data Sampling Mode" example (new in Splunk v6.4)
- New "Table Column Width" example (using custom extensions)
- Updated several examples to the Splunk v6.2 style search syntax
- Fixed a bug in "simple_event" where the search syntax was incorrect
- Updated "Eval Token Expressions" to include new syntax support (now allows for $token$ substitution)
What's New:
- Compatibility with Splunk 6.3 (refer to tags that indicate version compatibility)
- Updated "Single Value Element" example based on changes to Splunk 6.3
- New Single Value natively supports trend indicator, sparklines, and color controls
- Updated "Map Element" example to highlight new choropleth map type and alternative tile sets
- New "Table Element with Hidden Fields" example
- New "Single Value With Color" example to highlight advanced color controls
- New "Choropleth Maps" example to highlight new geospatial viz type in Splunk 6.3
- New "Choropleth Map Color Modes" example to highlight range of color controls
- New "Null Search Swapper" example to highlight new search value setter use case
- New "Search Result Setter" example to highlight new search event handler in Splunk 6.3
- New "Eval Token Expressions" example to highlight new eval expression support within token setter
- Updated "Link Switcher" example as this is now a native form input within Splunk
- Updated "Custom
What’s New:
- Compatibility with Splunk 6.2 (refer to tags that indicate example version compatibility)
- Bubble chart example
- Table row expansion example
- Updated search examples to use new search syntax
- New custom viz example driven by a form input
- Sankey custom viz example
- Drilldown tool to display available tokens
- Custom token links to control hide/show of rows/panels/elements
Upgrade Instructions:
- App can be upgraded via standard methods (from file, from app browser, or from CLI)
- Note that you may need to clear your browser cache for some of the updates to be visible
What's new:
- Fixed compatibility issue (now supports Splunk 6, 6.1)
- Note that not all examples will work with Splunk 6 (tags on the contents page denote version compatibility)
Upgrade Instructions:
Due to many of the changes made in this version, you must first delete the prior version before installing
- Delete prior version from the file system
- Install this v2.0.1 version
v2.0 - compatible with Splunk 6.1
v1.0 - compatible with Splunk 6
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.