Hi there,
I have a JSON input in Splunk and Splunk extracts the data. But it is not generating for each application in my case WCMS or ESIWEB as their own entry that is possible to sort through this data. All this information is related to one event.
How can I split these values?
I want that for each line break a new row is generated.
Thanks a lot in advance!
Yours
Sina
@wes7bb ,
Can you please try this?
YOUR_SEARCH
| rename 'data{}.application.name' as 'application_name', 'data{}.package.name' as 'package_name', 'data{}.planned_from' as 'planned_from'
| eval tempField= mvzip(mvzip(application_name,package_name),planned_from)
| stats count by tempField
| eval application_name = mvindex(split(tempField,","),0), package_name= mvindex(split(tempField,","),1), planned_from=mvindex(split(tempField,","),2)
| table application_name package_name planned_from
Thanks
@wes7bb ,
Can you please try this?
YOUR_SEARCH
| rename 'data{}.application.name' as 'application_name', 'data{}.package.name' as 'package_name', 'data{}.planned_from' as 'planned_from'
| eval tempField= mvzip(mvzip(application_name,package_name),planned_from)
| stats count by tempField
| eval application_name = mvindex(split(tempField,","),0), package_name= mvindex(split(tempField,","),1), planned_from=mvindex(split(tempField,","),2)
| table application_name package_name planned_from
Thanks
Thanks a lot for your help! It works!