<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract fields from nested json structure with dynamic key in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553227#M157052</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234799"&gt;@rkothari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;YOUR_SEARCH
| rex field=_raw "\"Name\":\s\"(?&amp;lt;Name&amp;gt;\w+)\",\"Version\":\s\"(?&amp;lt;Version&amp;gt;.+)\""
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My Sample Search :&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults count=2000 | eval a=1 | accum a
| eval _raw="{\"timeStamp\": \"2021-03-11T07:45:49.780000+00:00\",\"status\": \"deactive\",\"deviceId\": \"uuid12345".a."\",\"details\": {\"Device:Information\": {\"Type\": \"Apple\",\"Content\": {\"uuid12345".a."\": {\"Name\": \"IOS\",\"Version\": \"14.4\"}}}}}" |kv
| rex field=_raw "\"Name\":\s\"(?&amp;lt;Name&amp;gt;\w+)\",\"Version\":\s\"(?&amp;lt;Version&amp;gt;.+)\""
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;Thanks&lt;BR /&gt;KV&lt;BR /&gt;▄︻̷̿┻̿═━一&lt;BR /&gt;&lt;BR /&gt;If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;</description>
    <pubDate>Thu, 27 May 2021 04:41:50 GMT</pubDate>
    <dc:creator>kamlesh_vaghela</dc:creator>
    <dc:date>2021-05-27T04:41:50Z</dc:date>
    <item>
      <title>Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553041#M156982</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I have nested json type log messages like below being forwarded to splunk -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
        "timeStamp": "2021-03-11T07:45:49.780000+00:00",
        "status": "deactive",
        "deviceId": "uuid12345",
        "details": {
            "Device:Information": {
                "Type": "Apple",
                "Content": {
                    "uuid12345": {
                        "Name": "IOS",
                        "Version": "14.4"
                    }
                }
            }
        }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd like to generate a table like below out of all such log messages -&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;deviceId&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;Name&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;Version&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;uuid12345&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;IOS&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;14.4&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;uuid12346&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;Android&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;8.1&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am aware that a table of fields can be easily created using table command or stats (to get counts by Name and Version), however the problem with this log message structure is that the nested json path `details.Device:Information.Content` contains a key with value `&lt;EM&gt;uuid12345&lt;/EM&gt;` which is dynamic in nature.&lt;BR /&gt;&lt;BR /&gt;Therefore, a query like this doesn't work as I need since the wildcard character seem to create one column for each interpreted value like `&lt;EM&gt;details.Device:Information.Content.uuid12345.Name&lt;/EM&gt;`, `&lt;EM&gt;details.Device:Information.Content.uuid12346.Name&lt;/EM&gt;`, `&lt;EM&gt;details.Device:Information.Content.uuid12345.Version&lt;/EM&gt;`, `&lt;EM&gt;details.Device:Information.Content.uuid12346.Version&lt;/EM&gt;` -&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;| table deviceId, details.Device:Information.Content.*.Name, details.Device:Information.Content.*.Version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to get this information extracted into a table like I described above? Would it be possible to extract `Name` and `Version` as fields so that I don't have to use full json path in table or stats command?&lt;/P&gt;&lt;P&gt;Thanks for your help in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 00:46:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553041#M156982</guid>
      <dc:creator>rkothari</dc:creator>
      <dc:date>2021-05-26T00:46:51Z</dc:date>
    </item>
    <item>
      <title>Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553050#M156985</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234799"&gt;@rkothari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;YOUR_SEARCH
| eval Name="",Version=""
| foreach details.Device:Information.Content.*.Name [| eval Name=if(isnotnull('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'),'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',Name)]
| foreach details.Device:Information.Content.*.Version [| eval Version=if(isnotnull('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'),'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',Version)]
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Sample Code:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults 
| eval _raw="{\"timeStamp\": \"2021-03-11T07:45:49.780000+00:00\",\"status\": \"deactive\",\"deviceId\": \"uuid12345\",\"details\": {\"Device:Information\": {\"Type\": \"Apple\",\"Content\": {\"uuid12345\": {\"Name\": \"IOS\",\"Version\": \"14.4\"}}}}}" | append [| makeresults 
| eval _raw="{\"timeStamp\": \"2021-03-11T07:45:49.780000+00:00\",\"status\": \"deactive\",\"deviceId\": \"uuid123245\",\"details\": {\"Device:Information\": {\"Type\": \"Apple\",\"Content\": {\"uuid123245\": {\"Name\": \"Android\",\"Version\": \"14.4\"}}}}}"  ]
| kv 
| table deviceId "details.Device:Information.Content.*.Name" "details.Device:Information.Content.*.Version"
| eval Name="",Version=""
| foreach details.Device:Information.Content.*.Name [| eval Name=if(isnotnull('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'),'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',Name)]
| foreach details.Device:Information.Content.*.Version [| eval Version=if(isnotnull('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'),'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',Version)]
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;KV&lt;BR /&gt;▄︻̷̿┻̿═━一&lt;BR /&gt;&lt;BR /&gt;If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 04:53:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553050#M156985</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-05-26T04:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553212#M157045</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/127939"&gt;@kamlesh_vaghela&lt;/a&gt;&amp;nbsp;for sharing this. Your solution gets me the required data in table as expected, however it doesn't consistently show me values for "Name" and "Version" columns in all rows.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have about 2000 log events like the structure in my question, but every time I re-run your solution query I get blank values for "Name" and "Version" columns for varying number of rows. For example, I see all rows populated with value in "deviceId" but I only see actual values for "Name" and "Version" columns in 24 rows. Remaining rows show blank value for "Name" and "Version". Next time I refresh the search query, the number 24 changes to another number.&lt;/P&gt;&lt;P&gt;Could the foreach part of your solution be somehow contributing to this inconsistent behavior?&lt;BR /&gt;&lt;BR /&gt;UPDATE: I wanted to add that for the records that show a blank value in columns "Name" and "Version", I have verified that their raw log events have a valid string value at &lt;EM&gt;paths&amp;nbsp;details.Device:Information.Content.*.Name&lt;/EM&gt; and&amp;nbsp;&lt;EM&gt;details.Device:Information.Content.*.Version.&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;ANOTHER UPDATE: I can reproduce this problematic behavior with your proposed solution by feeding more than 1 log event. Could you please try feeding 2-4 log events to your proposed solution that may help you understand the problem? I think solving this might make your proposal a complete answer. Thanks again for all your help.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 01:04:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553212#M157045</guid>
      <dc:creator>rkothari</dc:creator>
      <dc:date>2021-05-27T01:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553227#M157052</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234799"&gt;@rkothari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;YOUR_SEARCH
| rex field=_raw "\"Name\":\s\"(?&amp;lt;Name&amp;gt;\w+)\",\"Version\":\s\"(?&amp;lt;Version&amp;gt;.+)\""
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My Sample Search :&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults count=2000 | eval a=1 | accum a
| eval _raw="{\"timeStamp\": \"2021-03-11T07:45:49.780000+00:00\",\"status\": \"deactive\",\"deviceId\": \"uuid12345".a."\",\"details\": {\"Device:Information\": {\"Type\": \"Apple\",\"Content\": {\"uuid12345".a."\": {\"Name\": \"IOS\",\"Version\": \"14.4\"}}}}}" |kv
| rex field=_raw "\"Name\":\s\"(?&amp;lt;Name&amp;gt;\w+)\",\"Version\":\s\"(?&amp;lt;Version&amp;gt;.+)\""
| table deviceId Name Version&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;Thanks&lt;BR /&gt;KV&lt;BR /&gt;▄︻̷̿┻̿═━一&lt;BR /&gt;&lt;BR /&gt;If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 04:41:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553227#M157052</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-05-27T04:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553427#M157136</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/127939"&gt;@kamlesh_vaghela&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your proposal using rex doesn't work with my data. It somehow works correctly with the way you are loading your sample data, but when I apply the rex and table command to my data like you have shared, it shows the Name and Version columns empty for all rows.&lt;BR /&gt;&lt;BR /&gt;I think your previous solution using foreach really got us very close except that weird behavior where some rows would show Name and Version columns empty randomly.&amp;nbsp; Do you have any idea how that part can be resolved in your first proposal? I think the weird behavior with foreach sounds very similar to &lt;A href="https://community.splunk.com/t5/Splunk-Search/Why-is-the-foreach-command-losing-event-data/m-p/422067#M121221" target="_blank" rel="noopener"&gt;this another post&lt;/A&gt;. Is there any bug with foreach functionality that would result in such behavior?&lt;/P&gt;&lt;P&gt;Thanks very much again!&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 00:34:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553427#M157136</guid>
      <dc:creator>rkothari</dc:creator>
      <dc:date>2021-05-28T00:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553434#M157137</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234799"&gt;@rkothari&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually both solutions should work and 2nd solution is much faster than 1st one. So can you please share your exact sample events, means &lt;STRONG&gt;_raw&amp;nbsp;&lt;/STRONG&gt;with no JSON formatting ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;KV&lt;BR /&gt;▄︻̷̿┻̿═━一&lt;BR /&gt;&lt;BR /&gt;If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 04:52:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553434#M157137</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-05-28T04:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from nested json structure with dynamic key</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553435#M157138</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/234799"&gt;@rkothari&lt;/a&gt;&amp;nbsp;wrote:&lt;P class="1622179167458"&gt;...&lt;/P&gt;&lt;P&gt;ANOTHER UPDATE: I can reproduce this problematic behavior with your proposed solution by feeding more than 1 log event. Could you please try feeding 2-4 log events to your proposed solution that may help you understand the problem? I think solving this might make your proposal a complete answer. Thanks again for all your help.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I used the following generator to produce 40 randomized events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults count=40
| streamstats count
| eval _time = now() - count * 65, uuid = 1000 + random() %256, type = if(random() % 3 == 0, "Apple", "Not Apple"), os = if(type == "Apple", "iOS", "Android"), version = if(os = "Apple", 11 + random() % 4 . "." . random() % 5, 3 + random() % 10 . "." . random() % 2)
| eval  _raw="{\"timeStamp\": \"" . strftime(_time, "%Y:%m:%d %H:%M:%S") . "\",\"status\": \"deactive\",\"deviceId\": \"uuid" . uuid . "\",\"details\": {\"Device:Information\": {\"Type\": \"" . type . "\",\"Content\": {\"uuid" . uuid . "\": {\"Name\": \"" . os . "\",\"Version\": \"". version . "\"}}}}}"
| fields _raw&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample events look like&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;_raw&lt;/TD&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:19:56","status": "deactive","deviceId": "uuid1093","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1093": {"Name": "Android","Version": "9.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:19:56&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:18:51","status": "deactive","deviceId": "uuid1148","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1148": {"Name": "Android","Version": "7.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:18:51&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:17:46","status": "deactive","deviceId": "uuid1234","details": {"Device:Information": {"Type": "Apple","Content": {"uuid1234": {"Name": "iOS","Version": "4.1"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:17:46&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:16:41","status": "deactive","deviceId": "uuid1136","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1136": {"Name": "Android","Version": "8.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:16:41&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:15:36","status": "deactive","deviceId": "uuid1085","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1085": {"Name": "Android","Version": "3.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:15:36&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:14:31","status": "deactive","deviceId": "uuid1151","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1151": {"Name": "Android","Version": "3.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:14:31&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:13:26","status": "deactive","deviceId": "uuid1098","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1098": {"Name": "Android","Version": "9.0"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:13:26&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:12:21","status": "deactive","deviceId": "uuid1029","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1029": {"Name": "Android","Version": "5.1"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:12:21&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:11:16","status": "deactive","deviceId": "uuid1181","details": {"Device:Information": {"Type": "Apple","Content": {"uuid1181": {"Name": "iOS","Version": "5.1"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:11:16&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;{"timeStamp": "2021:05:28 05:10:11","status": "deactive","deviceId": "uuid1186","details": {"Device:Information": {"Type": "Not Apple","Content": {"uuid1186": {"Name": "Android","Version": "4.1"}}}}}&lt;/TD&gt;&lt;TD&gt;2021-05-28 05:10:11&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;...&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then tested both filters by&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/127939"&gt;@kamlesh_vaghela&lt;/a&gt;&amp;nbsp;and indeed, they both work as expected. &amp;nbsp;So we can at least exclude the possibility that multiple events cause those filters to fail.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 05:25:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-nested-json-structure-with-dynamic-key/m-p/553435#M157138</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2021-05-28T05:25:12Z</dc:date>
    </item>
  </channel>
</rss>

