Splunk Enterprise

Indexing Json Array field

galsegal
Explorer

Hey, 

 

Can you please assist me with how to index this field:

galsegal_0-1595168246662.png

What I'm trying to do is to know which index has the 'true' value in it and take action accordingly.

For example , in pseudo code:

if(message.anomaly.features{}.anomaly[0] == true 
then newfield = 0

Thanks!

Labels (1)
0 Karma
1 Solution

niketn
Legend

@galsegal Try adding the following condition to find whether true value is present within JSON field message.anomaly.features.anomaly{} 

| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

The field isTrue evaluates to 1 if there is true value identified in respective field. If not it evaluates to 0.

PS: If you want to filter only events with one of the values as true instead of eval you can directly use search i.e. 

| search "message.anomaly.features.anomaly{}"="true"

Following is a run anywhere example based on one of the sample data provided.

| makeresults 
| eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"true\",
               \"false\",
               \"false\"
                ]
         }
      }
   }
}" 
| append 
    [| makeresults 
    | eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"false\",
               \"false\",
               \"false\"
                    ]
         }
      }
   }
}"] 
| spath 
| fields - _raw _time 
| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

 Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

niketn
Legend

@galsegal Try adding the following condition to find whether true value is present within JSON field message.anomaly.features.anomaly{} 

| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

The field isTrue evaluates to 1 if there is true value identified in respective field. If not it evaluates to 0.

PS: If you want to filter only events with one of the values as true instead of eval you can directly use search i.e. 

| search "message.anomaly.features.anomaly{}"="true"

Following is a run anywhere example based on one of the sample data provided.

| makeresults 
| eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"true\",
               \"false\",
               \"false\"
                ]
         }
      }
   }
}" 
| append 
    [| makeresults 
    | eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"false\",
               \"false\",
               \"false\"
                    ]
         }
      }
   }
}"] 
| spath 
| fields - _raw _time 
| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

 Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

galsegal
Explorer

Hi niketnilay,

 

Thanks for stepping in, appreciate the prompt response.

I might have phrased my question not so clear, what I’m trying to do is Ivactually need to know which of the indexes has the 'true' value in this. 

The best solution for me will be some kind of way to iterate this structure like in programming-

message.anomaly.features.anomaly{}[0],message.anomaly.features.anomaly{}[1] and so on..

Is this something that is possible to accomplish using splunk?

 

Thanks again,

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...