Splunk Search

Extracting fields from nested JSON event

kmaron
Motivator

I have a very complex nested JSON event and need to extract 2 fields. I've managed it with less complicated ones but this one has be a bit stumped.

I need to get the avgCycles and totalExecutions for each iRule - keeping hold of the name of the iRule. 

My event looks like this:

 

 

{ [-]
   clientSslProfiles: { [+]
   }
   deviceGroups: { [+]
   }
   httpProfiles: { [+]
   }
   iRules: { [-]
     /Department/Shared/Department_HTML_rewrite_Rule: { [-]
       application: Shared
       events: { [-]
         CLIENT_ACCEPTED: { [+]
         }
         HTML_TAG_MATCHED: { [+]
         }
         HTTP_REQUEST: { [+]
         }
         HTTP_RESPONSE: { [-]
           aborts: 0
           avgCycles: 28338
           failures: 0
           maxCycles: 1882653
           minCycles: 8898
           priority: 550
           totalExecutions: 86269
         }
       }
       name: /Department/Shared/Department_HTML_rewrite_Rule
       tenant: Department
     }
     /Common/Office-Rule: { [+]
     }
     /Common/Debug-Rule: { [+]
.....

 

 

 

 

Labels (1)
0 Karma

to4kawa
Ultra Champion

The command cannot be applied firmly because there is no log of _raw, but spath output= should be fine.

0 Karma

kmaron
Motivator

I don't understand what you're saying.   I need to pull out only the avgCycles and totalExecutions for every iRule, attached to the name of the iRule.  but I do not know how many there are, or what they are named. spath is just the start. It doesn't do the extraction or allow me to isolate those fields when I don't know the iRule names. 

0 Karma

to4kawa
Ultra Champion

I can't make a regular expression because you're only presenting the processed log. Also, there are no multiple logs.

0 Karma

to4kawa
Ultra Champion

Why don't you spath and table?

0 Karma

kmaron
Motivator

@to4kawa  I can spath but I have no idea how many iRules there will be per event or what they are named, and I don't know how many event types there will be or what they are named. 

0 Karma
Get Updates on the Splunk Community!

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...

Tech Talk | One Log to Rule Them All

One log to rule them all: how you can centralize your troubleshooting with Splunk logs We know how important ...

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through: An introduction to the Splunk Threat ...