Field Graph

Prev Next

Field Graph Widget

The Field Graph widget is one of the most versatile visualization tools in DataBee. It displays a time-series chart showing how many records match your configured query over time, with the option to aggregate a numeric field using count, minimum, maximum, or average. Use this widget to track trends in any OCSF activity table — from network traffic volumes and authentication event spikes to process activity patterns.

Configuration

Click + Add Widget, select Field Graph, and click Next.

Field

Required

Description

Default

Widget Name

Yes

A descriptive title (e.g., 'Network Activity Over Time', 'Authentication Events by Hour').

—

Table

Yes

The OCSF activity table to query. Start typing to filter the list of 80+ available tables.

—

Time Range

No

Period to display. Use Global inherits the console's time range.

Use Global

Query

No

A DataBee search query to filter records. Leave blank to include all records. See Query Syntax below.

Empty

Aggregation Field

No

A numeric field to aggregate instead of counting records. Only used with Min/Max/Average methods.

Empty

Aggregation Method

No

How to calculate the chart values: Count, Min, Max, or Average.

Count

Display

No

Chart visualization type.

Line Chart

Graph Summary

No

An optional description providing additional context about the chart.

Empty

Selecting a Table

The Table field gives you access to every OCSF activity table in your data lake. With 80+ tables available, typing to filter is the fastest way to find what you need. For example, typing 'network' narrows the list to Network Activity, Network Connection Query, etc.

Common tables include:

Table

Contains

Example Use

Authentication

Login events — success, failure, MFA challenges

Track failed login attempts over time

Network Activity

Network connections with source/dest IPs and ports

Monitor traffic volume trends

DNS Activity

DNS queries and responses

Detect DNS tunneling or unusual query patterns

HTTP Activity

HTTP requests and responses

Track web traffic volumes

Process Activity

Process creation and termination events

Monitor for suspicious process execution

Detection Finding

Detection rule matches and alerts from SIEM/EDR

Track alert volume over time

Vulnerability Finding

Vulnerability scan results and CVE matches

Monitor vulnerability discovery rates

File System Activity

File creation, modification, and access events

Track file access patterns

Email Activity

Email send, receive, and scan events

Monitor email volume and threats

Event Log Activity

Windows Event Logs and syslog entries

Track system event patterns

Display Types

Display

Best For

Description

Line Chart

Identifying trends over time

Renders as an area chart with a filled region beneath the line. Ideal for seeing gradual rises, sudden spikes, or steady patterns. Hover over any point to see the exact value at that moment.

Bar Chart

Comparing discrete time intervals

Renders as a column chart with one bar per time bucket. Useful for comparing day-over-day or hour-over-hour volumes — each bar represents a distinct time period.

Aggregation

By default, the Field Graph counts the number of matching records in each time bucket. For more advanced analysis, you can aggregate a numeric field instead.

Aggregation Method

Method

What It Does

Example Use Case

Count

Counts matching records. This is the default and most common method.

"How many authentication events occurred each hour?"

Min

Finds the minimum value of the Aggregation Field in each time bucket.

"What was the smallest file transferred each day?"

Max

Finds the maximum value of the Aggregation Field in each time bucket.

"What was the peak network packet size each hour?"

Average

Calculates the mean value of the Aggregation Field in each time bucket.

"What is the average HTTP response time over time?"

Aggregation Field

When using Min, Max, or Average, you must specify which numeric field to aggregate. Enter the field name using OCSF dotted notation — for example, traffic.bytes for byte counts, duration for event duration, or severity_id for severity levels.

Tip: For the most common use case — counting how many events occurred over time — leave Aggregation Method as Count and Aggregation Field empty. Only change these when you need to analyze a specific numeric dimension of your data.

Query Syntax

The Query field accepts DataBee's search query syntax to filter which records are included. If left blank, all records in the selected table within the time range are included.

Basic Syntax

Queries follow the format: field_name operator value

Supported Operators

Operator

Description

Example

in

Field value matches the specified value(s). Use parentheses for multiple values.

severity_id in (4,5,6)

notin

Field value does NOT match the specified value(s).

status_id notin (0,99)

contains

Field value contains the specified substring.

message contains ransomware

between

Field value falls between two values (inclusive). Separate with comma.

traffic.bytes between 1000,50000

Combining Conditions

Use "and" to combine multiple conditions. For example: severity_id in (4,5) and metadata.product.name in CrowdStrike

Nested Field Paths

Access nested fields using dot notation. Common paths include:

Path

Description

metadata.product.name

The security product that generated the event (e.g., CrowdStrike, Qualys)

src_endpoint.ip

Source IP address

dst_endpoint.ip

Destination IP address

device.name

Device hostname

user.name

Username

finding.severity

Finding severity level

Note: The widget's Time Range setting automatically filters by time — you do not need to include time filters in the Query field.

Query Examples for Field Graph

Scenario

Query

Only events from CrowdStrike

metadata.product.name in CrowdStrike

Exclude low-severity events

severity_id notin (0,1,2)

Only high and critical findings

severity_id in (4,5)

Events from a specific source IP

src_endpoint.ip in 10.0.0.1

Events containing a specific keyword

message contains unauthorized access

Combined: high severity from specific product

severity_id in (4,5) and metadata.product.name in CrowdStrike

Interactive Features

  • Hover over any point on the chart to see the exact count and timestamp in a tooltip.
  • Use the hamburger menu (three lines) on the chart to access additional chart options.
Copyright © 2026 DataBee®, A Comcast Company.
DataBee® is a registered trademark of Comcast.