<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: JSON - an array, many fields, mvzip and mvexpand issue in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543812#M154046</link>
    <description>&lt;P&gt;It was easy to just add the table command underneath after all the spath stuff, tried for a single item in splunk and it broke it down correctly in to the respectable lines.&lt;/P&gt;&lt;P&gt;I think this is the best and only mvexand and spath example on the forums that is truly end to end and works.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 15 Mar 2021 10:22:21 GMT</pubDate>
    <dc:creator>JimboSlice</dc:creator>
    <dc:date>2021-03-15T10:22:21Z</dc:date>
    <item>
      <title>JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543507#M153945</link>
      <description>&lt;P&gt;Hi, am I doing this correct or is there another way to tabulate this JSON?&lt;/P&gt;&lt;P&gt;I've seen many examples on the forums of people using mvexpand and mvzip to tabulate their JSON but this is working with just a few fields rather than a handful and not to any depths.&lt;/P&gt;&lt;P&gt;I have events pulled from the splunk add-on for microsoft cloud services.&lt;/P&gt;&lt;P&gt;As you may already know, this pulls body.records{}-&amp;gt;[Many subitems in an array]... for individual events:&lt;/P&gt;&lt;P&gt;One (redacted) event in splunk may look like so:&lt;/P&gt;&lt;P&gt;{&lt;BR /&gt;body: {&lt;BR /&gt;records: [&lt;BR /&gt;{&lt;BR /&gt;backendPoolName: XXXX-pool&lt;BR /&gt;backendSettingName: XXXX-backend-setting&lt;BR /&gt;category: ApplicationGatewayAccessLog&lt;BR /&gt;listenerName: XXXX-ssl-listener&lt;BR /&gt;operationName: ApplicationGatewayAccess&lt;BR /&gt;properties: {&lt;BR /&gt;clientIP: 4.5.6.7&lt;BR /&gt;clientPort: 56522&lt;BR /&gt;host: xxxx&lt;BR /&gt;httpMethod: GET&lt;BR /&gt;httpStatus: 302&lt;BR /&gt;httpVersion: HTTP/1.1&lt;BR /&gt;instanceId: appgw_1&lt;BR /&gt;originalHost: XXXX&lt;BR /&gt;originalRequestUriWithArgs: /XXXX&lt;BR /&gt;receivedBytes: 386&lt;BR /&gt;requestQuery: client_id=XXXX&lt;BR /&gt;requestUri: /XXXX&lt;BR /&gt;sentBytes: 1404&lt;BR /&gt;serverResponseLatency: 0.012&lt;BR /&gt;serverRouted: XXXX&lt;BR /&gt;serverStatus: 302&lt;BR /&gt;sslCipher: ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;sslClientCertificateFingerprint:&lt;BR /&gt;sslClientCertificateIssuerName:&lt;BR /&gt;sslClientVerify: NONE&lt;BR /&gt;sslEnabled: on&lt;BR /&gt;sslProtocol: TLSv1.2&lt;BR /&gt;timeTaken: 0.013&lt;BR /&gt;transactionId: XXXX&lt;BR /&gt;userAgent: Mozilla/5.0 (compatible; AhrefsBot/7.0; +&lt;A href="http://ahrefs.com/robot/" target="_blank" rel="noopener"&gt;http://ahrefs.com/robot/&lt;/A&gt;)&lt;BR /&gt;}&lt;BR /&gt;resourceId: /SUBSCRIPTIONS/XXXX/RESOURCEGROUPS/XXXX/PROVIDERS/MICROSOFT.NETWORK/APPLICATIONGATEWAYS/XXXX&lt;BR /&gt;ruleName: XXXX-ruleset&lt;BR /&gt;timeStamp: 2021-03-05T23:53:01+00:00&lt;BR /&gt;}&lt;BR /&gt;{&lt;BR /&gt;backendPoolName: XXXX-pool&lt;BR /&gt;backendSettingName: XXXX-backend-setting&lt;BR /&gt;category: ApplicationGatewayAccessLog&lt;BR /&gt;listenerName: XXXX-ssl-listener&lt;BR /&gt;operationName: ApplicationGatewayAccess&lt;BR /&gt;properties: {&lt;BR /&gt;clientIP: 1.2.3.4&lt;BR /&gt;clientPort: 52478&lt;BR /&gt;host: XXXX&lt;BR /&gt;httpMethod: GET&lt;BR /&gt;httpStatus: 200&lt;BR /&gt;httpVersion: HTTP/1.1&lt;BR /&gt;instanceId: appgw_1&lt;BR /&gt;originalHost: XXXX&lt;BR /&gt;originalRequestUriWithArgs: /session/XXXX&lt;BR /&gt;receivedBytes: 2087&lt;BR /&gt;requestQuery: XXXX&lt;BR /&gt;requestUri: /session/XXXX&lt;BR /&gt;sentBytes: 6081&lt;BR /&gt;serverResponseLatency: 0.024&lt;BR /&gt;serverRouted: XXXX&lt;BR /&gt;serverStatus: 200&lt;BR /&gt;sslCipher: ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;sslClientCertificateFingerprint:&lt;BR /&gt;sslClientCertificateIssuerName:&lt;BR /&gt;sslClientVerify: NONE&lt;BR /&gt;sslEnabled: on&lt;BR /&gt;sslProtocol: TLSv1.2&lt;BR /&gt;timeTaken: 0.028&lt;BR /&gt;transactionId: XXXX&lt;BR /&gt;userAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/87.0.4280.20 Safari/537.36&lt;BR /&gt;}&lt;BR /&gt;resourceId: /SUBSCRIPTIONS/XXXX/RESOURCEGROUPS/XXXX-PRGATEWAY/PROVIDERS/MICROSOFT.NETWORK/APPLICATIONGATEWAYS/GATEWAY-PR-AG&lt;BR /&gt;ruleName: XXXX-ruleset&lt;BR /&gt;timeStamp: 2021-03-05T23:53:03+00:00&lt;BR /&gt;}&lt;BR /&gt;]&lt;BR /&gt;}&lt;BR /&gt;x-opt-enqueued-time: 1614988459311&lt;BR /&gt;x-opt-offset: 29218690517200&lt;BR /&gt;x-opt-sequence-number: 19033991&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;First I had issues with empty values, so i have resolved this.&lt;/P&gt;&lt;P&gt;Some of these events are so big they wont render in the web gui, so its hard to tell what's going on, we have a plan to break them down using props/SEDCMD.&lt;/P&gt;&lt;P&gt;This is my query:&lt;/P&gt;&lt;P&gt;index=eventhub AND source="*C113*" AND body.records{}.resourceId="/subscriptions/XXXXX/resourcegroups/XXXXX-prgateway/providers/microsoft.network/applicationgateways/gateway-pr-ag"&lt;BR /&gt;| eval _raw = replace (_raw, "\":\"\",","\":\"N/A\",")&lt;/P&gt;&lt;P&gt;| spath&lt;/P&gt;&lt;P&gt;| rename body.records{}.timeStamp as timeStamp_&lt;BR /&gt;| rename body.records{}.properties.receivedBytes as receivedBytes_&lt;BR /&gt;| rename body.records{}.properties.clientIP as clientIP_&lt;BR /&gt;| rename body.records{}.properties.clientPort as clientPort_&lt;BR /&gt;| rename body.records{}.properties.host as host_&lt;BR /&gt;| rename body.records{}.properties.httpMethod as httpMethod_&lt;BR /&gt;| rename body.records{}.properties.httpStatus as httpStatus_&lt;BR /&gt;| rename body.records{}.properties.originalHost as originalHost_&lt;BR /&gt;| rename body.records{}.properties.originalRequestUriWithArgs as originalRequestUriWithArgs_&lt;BR /&gt;| rename body.records{}.properties.timeTaken as timeTaken_&lt;BR /&gt;| rename body.records{}.properties.userAgent as userAgent_&lt;/P&gt;&lt;P&gt;| eval x = mvzip(timeStamp_, clientIP_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval timeStamp2 = mvindex(x, 0)&lt;BR /&gt;| eval clientIP2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, receivedBytes_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval receivedBytes2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, clientPort_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval clientPort2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, host_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval host2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, httpMethod_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval httpMethod2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, httpStatus_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval httpStatus2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, originalHost_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval originalHost2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, originalRequestUriWithArgs_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval originalRequestUriWithArgs2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, timeTaken_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval timeTaken2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;| eval x = mvzip(clientIP_, userAgent_, ";;")&lt;BR /&gt;| mvexpand x&lt;BR /&gt;| eval x = split(x, ";;")&lt;BR /&gt;| eval clientIP2 = mvindex(x, 0)&lt;BR /&gt;| eval userAgent2 = mvindex(x, 1)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;| table timeStamp2, receivedBytes2, clientIP2, clientPort2, host2, httpMethod2, httpStatus2, originalHost2, originalRequestUriWithArgs2, timeTaken2, userAgent2&lt;BR /&gt;| dedup timeStamp2, receivedBytes2, clientIP2, clientPort2, host2, httpMethod2, httpStatus2, originalHost2, originalRequestUriWithArgs2, timeTaken2, userAgent2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm seeing exponentially more results in my table, the more fields I add.&lt;/P&gt;&lt;P&gt;limits.conf is being mentioned for result truncation with mvexpand being used.&lt;/P&gt;&lt;P&gt;I'm seeing user agents which, when I check an individual record manually, does not map, where an event has just one entry for a clientIP it's spawning many lines in my resulting table which appear to cover all combinations.&lt;/P&gt;&lt;P&gt;Any help on how to query this slightly advanced JSON dataset would be good, or perhaps point out where im going wrong? p.s. we have historical data we need to process, event breaking is on the horizon but we cant really get out of this one that easily...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 09:17:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543507#M153945</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-12T09:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543508#M153946</link>
      <description>&lt;P&gt;Is this approach worth trying?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-parse-my-JSON-data-with-spath-and-table-the-data/m-p/250462" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-parse-my-JSON-data-with-spath-and-table-the-data/m-p/250462&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 09:22:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543508#M153946</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-12T09:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543512#M153948</link>
      <description>&lt;P&gt;Rather than extracting everything at once, have you tried extracting&amp;nbsp; level by level e.g. extract the records array, mvexpand that, then extract the properties array from the record field and mvexpand that, etc.?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 09:53:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543512#M153948</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-12T09:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543513#M153949</link>
      <description>&lt;P&gt;Hi, how do i go about that?&amp;nbsp; I have not tried that yet, i'm not experienced enough to handle this sort of JSON.&lt;/P&gt;&lt;P&gt;I'm currently looking in to somehow creating a mvfield from the records array and handling the elements of that field individually using spath (e.g. effectively break an event to many events through search), for the outer items like timeStamp i will probably devise some method to append the value, its very difficult is this.&lt;/P&gt;&lt;P&gt;The solution link I posted earlier (&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-parse-my-JSON-data-with-spath-and-table-the-data/m-p/250462" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-parse-my-JSON-data-with-spath-and-table-the-data/m-p/250462&lt;/A&gt;)&amp;nbsp;doesn't work properly in 7.3.3 or i would try use that approach, many mvzips and one or two expands followed by tabulation, i've done this before for AWS logs some years ago with success, but i don't recall them being in such a state as this.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 10:05:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543513#M153949</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-12T10:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543517#M153950</link>
      <description>&lt;LI-CODE lang="markup"&gt;| makeresults | eval _raw="{
  \"body\": {
    \"records\": [
      {
        \"properties\": {
          \"clientIP\": \"4.5.6.7\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-05T23:53:01+00:00\"
      }
    ]
  }
}|{
  \"body\": {
    \"records\": [
      {
        \"properties\": {
          \"clientIP\": \"7.6.5.4\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-04T23:53:01+00:00\"
      },
      {
        \"properties\": {
          \"clientIP\": \"7.6.5.3\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-04T22:53:01+00:00\"
      }
    ]
  }
}|{
  \"body\": {
    \"records\": [
      {
        \"properties\": {
          \"clientIP\": \"6.7.8.9\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-03T23:53:01+00:00\"
      },
      {
        \"properties\": {
          \"clientIP\": \"6.7.8.10\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-03T22:53:01+00:00\"
      },
      {
        \"properties\": {
          \"clientIP\": \"6.7.8.11\",
          \"clientPort\": 56522
        },
        \"timeStamp\": \"2021-03-03T21:53:01+00:00\"
      }
    ]
  }
}"
| eval events=split(_raw,"|")
| mvexpand events
| eval _raw=events
| fields - _time events


| spath body.records{} output=records
| mvexpand records
| spath input=records timeStamp output=timeStamp
| spath input=records properties output=properties
| mvexpand properties
| spath input=properties
| fields - _raw properties records&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 12 Mar 2021 11:14:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543517#M153950</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-12T11:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543523#M153951</link>
      <description>&lt;P&gt;Wow, that works nice.&amp;nbsp;&amp;nbsp;Let me adapt it for this use case and re-post the complete search that works and for everyone to see!&lt;/P&gt;&lt;P&gt;I was just extracting the JSON using rex to then come up with some way to join the two and query as single item..&lt;/P&gt;&lt;P&gt;index=eventhub AND source="*C113*" AND body.records{}.resourceId="/subscriptions/a8736e42-ebd4-4459-a73c-54b2137562ba/resourcegroups/s141p01-prgateway/providers/microsoft.network/applicationgateways/gateway-pr-ag"&lt;BR /&gt;| eval _raw = replace (_raw, "\":\"\",","\":\"N/A\",")&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;| rex max_match=100 (?sU)(?&amp;lt;records&amp;gt;\{\s\"timeStamp\"\:.+\}\})&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| rex max_match=100 field=records (?sU)\"properties\"\:\s(?&amp;lt;properties&amp;gt;\{.+\"\})\}&lt;/STRONG&gt;&lt;BR /&gt;| table records, properties&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 11:44:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543523#M153951</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-12T11:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543535#M153954</link>
      <description>&lt;P&gt;Hi, in response to this and what i previously said about what i was mulling over, the below seems to work, but doesnt use spath, in any event here it is and im going to look at your solution which does use spath:&lt;BR /&gt;&lt;BR /&gt;index=eventhub AND source="*C113*" AND body.records{}.resourceId="/subscriptions/xxxxx/resourcegroups/s141p01-prgateway/providers/microsoft.network/applicationgateways/gateway-pr-ag"&lt;BR /&gt;| eval _raw = replace (_raw, "\":\"\",","\":\"N/A\",")&lt;BR /&gt;| rex max_match=100 (?sU)(?&amp;lt;records&amp;gt;\{\s\"timeStamp\"\:.+\}\})&lt;BR /&gt;| mvexpand records&lt;BR /&gt;| rename _raw as temp&lt;BR /&gt;| rename records as _raw&lt;BR /&gt;| extract&lt;BR /&gt;| rename temp as _raw&lt;BR /&gt;| table timeStamp, backendPoolName, backendSettingName, ruleName, properties.receivedBytes, properties.clientIP, properties.clientPort, properties.host, properties.httpMethod, properties.httpStatus, properties.originalHost, properties.originalRequestUriWithArgs, properties.timeTaken, properties.userAgent&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 12:36:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543535#M153954</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-12T12:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543543#M153959</link>
      <description>&lt;P&gt;You might want to consider max_match=0 in case there are more than 100 records in an event&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 13:25:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543543#M153959</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-03-12T13:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: JSON - an array, many fields, mvzip and mvexpand issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543812#M154046</link>
      <description>&lt;P&gt;It was easy to just add the table command underneath after all the spath stuff, tried for a single item in splunk and it broke it down correctly in to the respectable lines.&lt;/P&gt;&lt;P&gt;I think this is the best and only mvexand and spath example on the forums that is truly end to end and works.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 10:22:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-an-array-many-fields-mvzip-and-mvexpand-issue/m-p/543812#M154046</guid>
      <dc:creator>JimboSlice</dc:creator>
      <dc:date>2021-03-15T10:22:21Z</dc:date>
    </item>
  </channel>
</rss>

