Splunk Search

How do I get arbitrary nested key-value pairs from JSON?

mldavis195
Explorer

I have some JSON that looks similar to this:

 

 

{
    "foo": "bar",
    "x": {
        "hello": "world",
        "y": {
            "A": 400,
            "B": 500,
            "C": 300
        }
    }
}
{
    "foo": "baz",
    "x": {
        "something": "test",
        "y": {
            "A": 100,
            "D": 200,
            "E": 600
        }
    }
}

 

 

 What I would like is to extract everything in x.y for a sum but the keys are dynamic and I won't know them all in advance:

A 500
B 500
C 300
D 200
E 600

 

I have been stuck on this one for a while. Can anyone help me?

Labels (1)
0 Karma
1 Solution

yuanliu
SplunkTrust
SplunkTrust

If that's your raw event, you would have fields like x.y.A, x.y.B, etc., already.  Just do

| stats sum(x.y.*) as *

If they are in an extracted field, say jsonfield, spath first.

| spath input=jsonfield
| stats sum(x.y.*) as *

View solution in original post

yuanliu
SplunkTrust
SplunkTrust

If that's your raw event, you would have fields like x.y.A, x.y.B, etc., already.  Just do

| stats sum(x.y.*) as *

If they are in an extracted field, say jsonfield, spath first.

| spath input=jsonfield
| stats sum(x.y.*) as *

mldavis195
Explorer

Thanks, seems so obvious after seeing your solution.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...