Field Value Count Widget
The Field Value Count widget shows how values are distributed for a selected field in an OCSF activity table. Choose from horizontal bar charts, vertical bar charts, or pie charts to visualize the breakdown. This widget answers questions like 'What percentage of vulnerability findings are Critical vs Medium?' or 'How many authentication events succeeded vs failed this week?'

Configuration
Click + Add Widget, select Field Value Count, and click Next.

Field | Required | Description | Default |
Widget Name | Yes | A title (e.g., 'Vulnerability Findings by Severity'). | — |
Activity | Yes | The OCSF activity table to query. Start typing to filter. | — |
Field Name | Yes | The categorical field to summarize. Type to filter, or use dotted notation for nested fields (e.g., finding.severity). | — |
Time Range | No | Period to display. | Use Global |
Query | No | A DataBee search query to filter records. | Empty |
Display | No | Chart type: Horizontal, Vertical, or Pie. | Horizontal |
Sort Direction | No | Order of values in the chart. | Higher Count First |
Choosing a Field Name
The Field Name determines what values appear in your chart. Choose a field with a manageable number of distinct values — fields with 3-10 unique values produce the clearest visualizations.
Field | Found In | Typical Values |
Severity | Vulnerability Finding, Detection Finding | Fatal, Critical, High, Medium, Low |
Severity ID | All finding tables | Numeric levels 0-6 (auto-colored: green→red) |
Status | Authentication | Success, Failure, Unknown, Other |
Activity Name | Most activity tables | Create, Read, Update, Delete, Close |
Type Name | All tables | Event type classification |
Disposition | Security Finding | How the finding was handled |
Category Name | Detection Finding | Detection rule categories |
Note: Fields ending in _id (like severity_id, status_id, confidence_id) automatically receive color coding — green for low values, yellow for medium, red for high. This makes severity and status distributions immediately readable.
Display Types
Type | Best For | Description |
Horizontal | Comparing proportions (3-10 values) | Horizontal bars with labels on the left and counts on the right. Each bar includes a percentage-of-total indicator. 'Total' count appears at the top. This is the default and most common choice. |
Vertical | Compact display | Values stacked vertically with counts. Similar to Horizontal but in a more compact layout. |
Pie | Part-of-whole analysis (2-6 values) | Interactive pie chart with colored slices and percentage labels. Hover over a slice to see the exact count. Best when you have a small number of distinct values. |
Sort Direction
Option | Effect |
Show Higher Count Values First | Most frequent values appear at top (bar) or as largest slices (pie). This is the default. |
Show Lower Count Values First | Least frequent values appear first. Useful for highlighting rare events or anomalies. |
Note: An 'Other' category may appear at the bottom, grouping infrequent values. This category always appears last regardless of sort direction.
Query Syntax
The Query field accepts DataBee's search query syntax to filter which records are included. If left blank, all records in the selected table within the time range are included.
Basic Syntax
Queries follow the format: field_name operator value
Supported Operators
Operator | Description | Example |
in | Field value matches the specified value(s). Use parentheses for multiple values. | severity_id in (4,5,6) |
notin | Field value does NOT match the specified value(s). | status_id notin (0,99) |
contains | Field value contains the specified substring. | message contains ransomware |
between | Field value falls between two values (inclusive). Separate with comma. | traffic.bytes between 1000,50000 |
Combining Conditions
Use "and" to combine multiple conditions. For example: severity_id in (4,5) and metadata.product.name in CrowdStrike
Nested Field Paths
Access nested fields using dot notation. Common paths include:
Path | Description |
metadata.product.name | The security product that generated the event (e.g., CrowdStrike, Qualys) |
src_endpoint.ip | Source IP address |
dst_endpoint.ip | Destination IP address |
device.name | Device hostname |
user.name | Username |
finding.severity | Finding severity level |
Note: The widget's Time Range setting automatically filters by time — you do not need to include time filters in the Query field.
Query Examples for Field Value Count
Scenario | Query |
Only vulnerabilities from Qualys | metadata.product.name in Qualys |
Exclude informational findings | severity_id notin (0,1) |
Only failed authentication attempts | status_id in (2) |
Events from a specific device | device.name in web-server-01 |
Only high-risk vulnerabilities | severity_id in (4,5,6) |
Interactive Features
- Click on any bar or pie slice to pivot to Search, filtered to that specific value.
- Hover over chart elements to see exact counts and percentages in a tooltip.