Getting Data In

Splunk Parsing - How to do it

deepak312
Explorer

I have below json that is printed in logs,

{
  "timestamp": "2019-08-15T07:30:10,472Z",
  "level": "INFO",
  "thread": "xyz.default-dispatcher-27",
  "message": "Some message",
  "logger": "com.abc.xyz",
  "run_number": 1,
  "id": "123",
  "type_id": "Test",
  "roll_number": "12889",
  "status": "Fail",
  "comments": "Result failed",
  "new_map": {
    "8890": {
      "number": "null"
    }
  },
  "old_map": {
    "8890": {
      "number": "86"
    }
  },
  "condition_id": "65",
  "created_date": "2019-07-24",
  "modified_date": "2019-07-25"
}

I need to create a table to print id, roll_number, new_map and old_map. Tried using spath but no luck. Any help would be appreciated.

0 Karma

apcsplunk
Explorer

It auto-extracted for me and i just had to type "| table id, roll_number, new_map.8890.number, old_map.8890.number"
May be you can clarify more on what should be the expected result

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...