Splunk Enterprise

Indexing Json Array field

galsegal
Explorer

Hey, 

 

Can you please assist me with how to index this field:

galsegal_0-1595168246662.png

What I'm trying to do is to know which index has the 'true' value in it and take action accordingly.

For example , in pseudo code:

if(message.anomaly.features{}.anomaly[0] == true 
then newfield = 0

Thanks!

Labels (1)
0 Karma
1 Solution

niketn
Legend

@galsegal Try adding the following condition to find whether true value is present within JSON field message.anomaly.features.anomaly{} 

| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

The field isTrue evaluates to 1 if there is true value identified in respective field. If not it evaluates to 0.

PS: If you want to filter only events with one of the values as true instead of eval you can directly use search i.e. 

| search "message.anomaly.features.anomaly{}"="true"

Following is a run anywhere example based on one of the sample data provided.

| makeresults 
| eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"true\",
               \"false\",
               \"false\"
                ]
         }
      }
   }
}" 
| append 
    [| makeresults 
    | eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"false\",
               \"false\",
               \"false\"
                    ]
         }
      }
   }
}"] 
| spath 
| fields - _raw _time 
| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

 Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

niketn
Legend

@galsegal Try adding the following condition to find whether true value is present within JSON field message.anomaly.features.anomaly{} 

| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

The field isTrue evaluates to 1 if there is true value identified in respective field. If not it evaluates to 0.

PS: If you want to filter only events with one of the values as true instead of eval you can directly use search i.e. 

| search "message.anomaly.features.anomaly{}"="true"

Following is a run anywhere example based on one of the sample data provided.

| makeresults 
| eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"true\",
               \"false\",
               \"false\"
                ]
         }
      }
   }
}" 
| append 
    [| makeresults 
    | eval _raw="
{
   \"message\":{
      \"anomaly\":{
         \"features\":{
            \"anomaly\":[
               \"false\",
               \"false\",
               \"false\",
               \"false\"
                    ]
         }
      }
   }
}"] 
| spath 
| fields - _raw _time 
| eval isTrue=if(('message.anomaly.features.anomaly{}'="true"),1,0)

 Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

galsegal
Explorer

Hi niketnilay,

 

Thanks for stepping in, appreciate the prompt response.

I might have phrased my question not so clear, what I’m trying to do is Ivactually need to know which of the indexes has the 'true' value in this. 

The best solution for me will be some kind of way to iterate this structure like in programming-

message.anomaly.features.anomaly{}[0],message.anomaly.features.anomaly{}[1] and so on..

Is this something that is possible to accomplish using splunk?

 

Thanks again,

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...