<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pulling Unique Records from JSON in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605023#M210417</link>
    <description>&lt;P&gt;Please can you include correct JSON e.g.&amp;nbsp;"function_metadata" is not complete.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Jul 2022 21:19:55 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2022-07-08T21:19:55Z</dc:date>
    <item>
      <title>How to Pull Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605017#M210414</link>
      <description>&lt;P&gt;I have read a lot of different threads and docs but still having trouble pulling what I need out of the below JSON. Essentially want a condensed list of the vulnerabilities data but this JSON nests the vulnerabilities based on the "Package". I would like a table that lists all the applicable vulns and for each image.&lt;BR /&gt;&lt;BR /&gt;Table I am trying to get&lt;/P&gt;
&lt;TABLE border="1" width="44.40539513677812%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="12.5%"&gt;Image&lt;/TD&gt;
&lt;TD width="12.5%"&gt;Name (CVE)&lt;/TD&gt;
&lt;TD width="12.651975683890578%"&gt;NVD_Score&lt;/TD&gt;
&lt;TD width="12.348024316109422%"&gt;Description&lt;/TD&gt;
&lt;TD width="12.5%"&gt;etc...&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="12.5%"&gt;&lt;EM&gt;Image_name&lt;/EM&gt;&lt;/TD&gt;
&lt;TD width="12.5%"&gt;CVE-2022-0530&lt;/TD&gt;
&lt;TD width="12.651975683890578%"&gt;4.3&lt;/TD&gt;
&lt;TD width="12.348024316109422%"&gt;A flaw was found....&lt;/TD&gt;
&lt;TD width="12.5%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Image of JSON example&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_2.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/20470i859C70720742D1B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_2.png" alt="Screenshot_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I can include raw data if that would help.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 14:25:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605017#M210414</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-11T14:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605020#M210416</link>
      <description>&lt;LI-CODE lang="markup"&gt;  "FileHashEncoding": "zlib",
  "data_date": 1657231001,
  "digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
  "function_metadata"
  "image": "HIDDEN",
  "image_id": 13496,
  "image_size": 875346670,
  "initiating_user": "scheduler",
  "internal_digest_id": {
    "id": 13857
  },
  "os": "rhel",
  "previous_digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
  "pull_name": "HIDDEN",
  "pull_skipped": true,
  "registry": "HIDDEN",
  "required_image_platform": "amd64:::",
  "resources": [
    {
      "resource": {
        "arch": "x86_64",
        "cpe": "pkg:/rhel:8.5:pcre2:10.32-2.el8",
        "format": "rpm",
        "issue_type": "{}",
        "layer_digest": "sha256:54e56e6f85721741ee7bf0336de8ad3bf138a56769a6d0097b600",
        "license": "BSD",
        "name": "pcre2",
        "sensitive_name": "{}",
        "src_name": "pcre2",
        "src_version": "10.32-2.el8",
        "version": "10.32-2.el8"
      },
      "scanned": true,
      "vulnerabilities": [
        {
          "already_acknowledged": true,
          "aqua_score": 7.1,
          "aqua_score_classification": "Vendor CVSS V3 Score: 7.1",
          "aqua_scoring_system": "CVSS V3",
          "aqua_severity": "medium",
          "aqua_severity_classification": "Vendor Severity: moderate",
          "aqua_vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
          "description": "An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the  pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.",
          "fix_version": "any in rhel 9",
          "heuristic_ref_id": 2179679,
          "modification_date": "2022-06-02",
          "name": "CVE-2022-1586",
          "nvd_score": 6.4,
          "nvd_score_v3": 9.1,
          "nvd_score_version": "CVSS v2",
          "nvd_severity": "medium",
          "nvd_severity_v3": "critical",
          "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1586",
          "nvd_vectors": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "nvd_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "publish_date": "2022-05-16",
          "solution": "Upgrade operating system to rhel version 9 (includes fixed versions of pcre2)",
          "vendor_score_v3": 7.1,
          "vendor_score_version": "CVSS v2",
          "vendor_severity": "moderate",
          "vendor_url": "https://access.redhat.com/security/cve/CVE-2022-1586",
          "vendor_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
        }
      ]
    },
    {
      "resource": {
        "arch": "x86_64",
        "cpe": "pkg:/rhel:8.5:unzip:6.0-45.el8_4",
        "format": "rpm",
        "issue_type": "{}",
        "layer_digest": "sha256:7d53446fc2f86b9129c8e42438d860ad572982eb28d61b58697fb7682274e252",
        "license": "BSD",
        "name": "unzip",
        "sensitive_name": "{}",
        "src_name": "unzip",
        "src_version": "6.0-45.el8_4",
        "version": "6.0-45.el8_4"
      },
      "scanned": true,
      "vulnerabilities": [
        {
          "aqua_score": 5.5,
          "aqua_score_classification": "Vendor CVSS V3 Score: 5.5",
          "aqua_scoring_system": "CVSS V3",
          "aqua_severity": "low",
          "aqua_severity_classification": "Vendor Severity: low",
          "aqua_vectors": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "description": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
          "fix_version": "any in rhel 9",
          "heuristic_ref_id": 2015547,
          "modification_date": "2022-05-17",
          "name": "CVE-2022-0530",
          "nvd_score": 4.3,
          "nvd_score_v3": 5.5,
          "nvd_score_version": "CVSS v2",
          "nvd_severity": "medium",
          "nvd_severity_v3": "medium",
          "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530",
          "nvd_vectors": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "nvd_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "publish_date": "2022-02-09",
          "solution": "Upgrade operating system to rhel version 9 (includes fixed versions of unzip)",
          "vendor_score_v3": 5.5,
          "vendor_score_version": "CVSS v2",
          "vendor_severity": "low",
          "vendor_statement": "This package is affected by this flaw on this platform, but there is currently no intention to fix it",
          "vendor_url": "https://access.redhat.com/security/cve/CVE-2022-0530",
          "vendor_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
        },&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 08 Jul 2022 20:47:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605020#M210416</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-08T20:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605023#M210417</link>
      <description>&lt;P&gt;Please can you include correct JSON e.g.&amp;nbsp;"function_metadata" is not complete.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 21:19:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605023#M210417</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-07-08T21:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605029#M210421</link>
      <description>&lt;LI-CODE lang="markup"&gt;{
	"FileHashEncoding": "zlib",
	"data_date": 1657231001,
	"digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
	"function_metadata": {},
	"image": "HIDDEN",
	"image_id": 13496,
	"image_size": 875346670,
	"initiating_user": "scheduler",
	"internal_digest_id": {
		"id": 13857
	},
	"os": "rhel",
	"previous_digest": "sha256:fa4b861d9ef72bb594ee6546f2356ed871e5c585e9306de92a4cf54fc",
	"pull_name": "HIDDEN",
	"pull_skipped": true,
	"registry": "HIDDEN",
	"required_image_platform": "amd64:::",
	"resources": [{
			"resource": {
				"arch": "x86_64",
				"cpe": "pkg:/rhel:8.5:pcre2:10.32-2.el8",
				"format": "rpm",
				"issue_type": "{}",
				"layer_digest": "sha256:54e56e6f85721741ee7bf0336de8ad3bf138a56769a6d0097b600",
				"license": "BSD",
				"name": "pcre2",
				"sensitive_name": "{}",
				"src_name": "pcre2",
				"src_version": "10.32-2.el8",
				"version": "10.32-2.el8"
			},
			"scanned": true,
			"vulnerabilities": [{
				"already_acknowledged": true,
				"aqua_score": 7.1,
				"aqua_score_classification": "Vendor CVSS V3 Score: 7.1",
				"aqua_scoring_system": "CVSS V3",
				"aqua_severity": "medium",
				"aqua_severity_classification": "Vendor Severity: moderate",
				"aqua_vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
				"description": "An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the  pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.",
				"fix_version": "any in rhel 9",
				"heuristic_ref_id": 2179679,
				"modification_date": "2022-06-02",
				"name": "CVE-2022-1586",
				"nvd_score": 6.4,
				"nvd_score_v3": 9.1,
				"nvd_score_version": "CVSS v2",
				"nvd_severity": "medium",
				"nvd_severity_v3": "critical",
				"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1586",
				"nvd_vectors": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
				"nvd_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
				"publish_date": "2022-05-16",
				"solution": "Upgrade operating system to rhel version 9 (includes fixed versions of pcre2)",
				"vendor_score_v3": 7.1,
				"vendor_score_version": "CVSS v2",
				"vendor_severity": "moderate",
				"vendor_url": "https://access.redhat.com/security/cve/CVE-2022-1586",
				"vendor_vectors_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
			}]
		},
		{
			"resource": {
				"arch": "x86_64",
				"cpe": "pkg:/rhel:8.5:unzip:6.0-45.el8_4",
				"format": "rpm",
				"issue_type": "{}",
				"layer_digest": "sha256:7d53446fc2f86b9129c8e42438d860ad572982eb28d61b58697fb7682274e252",
				"license": "BSD",
				"name": "unzip",
				"sensitive_name": "{}",
				"src_name": "unzip",
				"src_version": "6.0-45.el8_4",
				"version": "6.0-45.el8_4"
			},
			"scanned": true,
			"vulnerabilities": [{
				"aqua_score": 5.5,
				"aqua_score_classification": "Vendor CVSS V3 Score: 5.5",
				"aqua_scoring_system": "CVSS V3",
				"aqua_severity": "low",
				"aqua_severity_classification": "Vendor Severity: low",
				"aqua_vectors": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
				"description": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
				"fix_version": "any in rhel 9",
				"heuristic_ref_id": 2015547,
				"modification_date": "2022-05-17",
				"name": "CVE-2022-0530",
				"nvd_score": 4.3,
				"nvd_score_v3": 5.5,
				"nvd_score_version": "CVSS v2",
				"nvd_severity": "medium",
				"nvd_severity_v3": "medium",
				"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530",
				"nvd_vectors": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
				"nvd_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
				"publish_date": "2022-02-09",
				"solution": "Upgrade operating system to rhel version 9 (includes fixed versions of unzip)",
				"vendor_score_v3": 5.5,
				"vendor_score_version": "CVSS v2",
				"vendor_severity": "low",
				"vendor_statement": "This package is affected by this flaw on this platform, but there is currently no intention to fix it",
				"vendor_url": "https://access.redhat.com/security/cve/CVE-2022-0530",
				"vendor_vectors_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
			}]
		}
	]
}&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 08 Jul 2022 21:33:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605029#M210421</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-08T21:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605084#M210435</link>
      <description>&lt;P&gt;This requirement is highly domain specific, so I have to make some speculation about the data and your intent. To start, the top-level field "image" has the value of "HIDDEN" in your sample, so I will ignore that. &amp;nbsp;Instead, the fields&amp;nbsp;resources{}.resource.name,&amp;nbsp;resources{}.resource.version, and so on, are relevant.&lt;/P&gt;&lt;P&gt;Secondly, the resources{}.vulnerabilities{} is an array on itself but the sample data only contain one vulnerability per resource, so the sample code below takes the shortcut of only handling a single vulnerability. &amp;nbsp;To handle real data, you'll need to have another mvmap for vulnerabilities{}. &amp;nbsp;Third, there are lots of fields of interest in vulnerabilities, but the technique used below requires custom coding. &amp;nbsp;So, I am just choosing select few to illustrate.&lt;/P&gt;&lt;P&gt;With this said, here is a proof of concept to see if this is where the requirement leads to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rename resources{}.vulnerabilities{}.* AS vulnerabilities_* resources{}.resource.* AS resource_*
| eval ind = mvrange(0, mvcount(resource_name))
| eval zipped = mvmap(ind, mvappend(zipped, "resource_name=" . mvindex(resource_name, ind) . "&amp;lt;&amp;gt;" . "resource_version=" . mvindex(resource_version, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_name=" . mvindex(vulnerabilities_name, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_description=" . mvindex(vulnerabilities_description, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_nvd_severity=" . mvindex(vulnerabilities_nvd_severity, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_nvd_score=" . mvindex(vulnerabilities_nvd_score, ind)))
| mvexpand zipped
| fields zipped
| rename zipped AS _raw
| kv pairdelim="&amp;lt;&amp;gt;" kvdelim="="
| table resource_* vulnerabilities_*&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using the sample data, I get something like&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;resource_name&lt;/TD&gt;&lt;TD&gt;resource_version&lt;/TD&gt;&lt;TD&gt;vulnerabilities_description&lt;/TD&gt;&lt;TD&gt;vulnerabilities_name&lt;/TD&gt;&lt;TD&gt;vulnerabilities_nvd_score&lt;/TD&gt;&lt;TD&gt;vulnerabilities_nvd_severity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;pcre2&lt;/TD&gt;&lt;TD&gt;10.32-2.el8&lt;/TD&gt;&lt;TD&gt;An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.&lt;/TD&gt;&lt;TD&gt;CVE-2022-1586&lt;/TD&gt;&lt;TD&gt;6.4&lt;/TD&gt;&lt;TD&gt;medium&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;unzip&lt;/TD&gt;&lt;TD&gt;6.0-45.el8_4&lt;/TD&gt;&lt;TD&gt;A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.&lt;/TD&gt;&lt;TD&gt;CVE-2022-0530&lt;/TD&gt;&lt;TD&gt;4.3&lt;/TD&gt;&lt;TD&gt;medium&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Sun, 10 Jul 2022 20:52:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605084#M210435</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-07-10T20:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605089#M210436</link>
      <description>&lt;P&gt;In this example I would need the image and image_id zipped up with this data as well. This is vuln data so identifying the image would be really important. I changed the name to HIDDEN to remove potentially sensitive data.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 02:12:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605089#M210436</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-11T02:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605090#M210437</link>
      <description>&lt;P&gt;Because image and image_id are single value, all that is needed is to add them to display, such as the table command, e.g.,&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| table image image_id resource_* vulnerabilities_*&lt;/LI-CODE&gt;&lt;P&gt;In my sample code, I mistakenly included "| fields zipped", which was a test technique for myself, not part of the PoC. &amp;nbsp;Take it out, so the code would look like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rename resources{}.vulnerabilities{}.* AS vulnerabilities_* resources{}.resource.* AS resource_*
| eval ind = mvrange(0, mvcount(resource_name))
| eval zipped = mvmap(ind, mvappend(zipped, "resource_name=" . mvindex(resource_name, ind) . "&amp;lt;&amp;gt;" . "resource_version=" . mvindex(resource_version, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_name=" . mvindex(vulnerabilities_name, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_description=" . mvindex(vulnerabilities_description, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_nvd_severity=" . mvindex(vulnerabilities_nvd_severity, ind) . "&amp;lt;&amp;gt;" . "vulnerabilities_nvd_score=" . mvindex(vulnerabilities_nvd_score, ind)))
| mvexpand zipped
| rename zipped AS _raw
| kv pairdelim="&amp;lt;&amp;gt;" kvdelim="="
| table image image_id resource_* vulnerabilities_*&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 11 Jul 2022 03:47:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605090#M210437</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-07-11T03:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605091#M210438</link>
      <description>&lt;P&gt;Thank you so much!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 03:53:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605091#M210438</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-11T03:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605092#M210439</link>
      <description>&lt;P&gt;Sorry I have one more question.&lt;BR /&gt;&lt;BR /&gt;I don't want to group by resource_name. Ideally each instance of (image, cve, resource) should be unique. that way I can assess the overall count of vulnerabilities in unique records if that makes sense.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 04:08:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605092#M210439</guid>
      <dc:creator>morgantay96</dc:creator>
      <dc:date>2022-07-11T04:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling Unique Records from JSON</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605096#M210440</link>
      <description>&lt;P&gt;Based on sample data, it is clear that each "image" contains multiple resources, and each resource can have multiple vulnerabilities. &amp;nbsp;If you only want to group by image, one solution is to just remove fields that you don't care about and preserve the array structure. &amp;nbsp;In this case, the illustrated table in your requirement will only make sense if you don't care about resources at all.&lt;/P&gt;&lt;P&gt;Here is one idea&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rename resources{}.vulnerabilities{}.* AS vulnerabilities_*
| table image image_id vulnerabilities_name vulnerabilities_nvd_score vulnerabilities_nvd_severity vulnerabilities_description&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With sample data, output looks like&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;image&lt;/TD&gt;&lt;TD&gt;image_id&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;vulnerabilities_name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;vulnerabilities_nvd_score&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;vulnerabilities_nvd_severity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;vulnerabilities_description&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;HIDDEN&lt;/TD&gt;&lt;TD&gt;13496&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;CVE-2022-1586&lt;/DIV&gt;&lt;DIV class=""&gt;CVE-2022-0530&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;6.4&lt;/DIV&gt;&lt;DIV class=""&gt;4.3&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;medium&lt;/DIV&gt;&lt;DIV class=""&gt;medium&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.&lt;/DIV&gt;&lt;DIV class=""&gt;A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;You'll notice that, unless you add additional markers or ordinals, it can become difficult for the reader to discern the alignment, especially when number of vulnerabilities becomes large.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 05:23:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Pull-Unique-Records-from-JSON/m-p/605096#M210440</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-07-11T05:23:16Z</dc:date>
    </item>
  </channel>
</rss>

