Splunk Search

How to display a table with status reason and count of different status reasons like "NO_ID_UPLOADED", "FRAUD_ID"?

shashaikhhh
Explorer

Hi,
This is splunk query and it returns nested JSON object 

Query:
sourcetype=_json_fluentd source="***" | search message="SQS Result Data" "FAIL"

Response:

{ [-]
   additional: { [-]
     Messages: [ [-]
       { [-]
         Body{ "clientName" : "mpc", "tenantId" : "assd", "mid" : "asd-bhn", "userId" : "112778", "transactionReferenceId" : "trans1223", "verificationResult" : "FAIL", "verificationResultTimestamp" : "2022-05-19T05:44:24.090Z", "statusReason" : "NO_ID_UPLOADED" }
     ]

   }

   levelinfo
   messageSQS Result Data

}

I want to display a table with status reason and count of different status reasons like "NO_ID_UPLOADED", "FRAUD_ID".
Please share your answers.

Labels (4)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| spath
| spath input=additional.Messages{}.Body
| stats count by statusReason

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| stats count by additional.Messages{}.Body.statusReason

If this doesn't work, please share some sample raw events (i.e. not formatted) in a code block preferably

0 Karma

shashaikhhh
Explorer

shashaikhhh_0-1652952401512.png

Tried, not working.
Please find the raw events data

{"sessionId":"cl3cmekh8nvgbaxf1bm",

"requestId":"cleh8nv1526885k",

"additional"{"ResponseMetadata":

{"RequestId":"ffcdff50-d-a5af2808ad5c"},"Messages":[

{"MessageId":"bf-f7ec-4a45-a546-08a2d6e4",

"Body":"{\n \"clientName\" : \"mpc\",\n \"tenantId\" : \"9TQ389G0BZH3XSHK57Y88Z1H5M\",\n \"mid\" : \"60300004707-bhn\",\n \"userId\" : \"1432778\",\n \"transactionReferenceId\" : \"ACBJBG91X2N8TT591A3DJYXGR0\",\n \"verificationResult\" : \"FAIL\",\n \"verificationResultTimestamp\" : \"2022-05-19T05:44:24.090Z\",\n \"statusReason\" : \"NO_ID_UPLOADED\"\n}"}

]

},"level":"info","message":"SQS Result Data","platform":"HI-Marketplace","project":"YourCardHub","instance_id":"i-05e770b3db412","index":"bhn_apps","host":"production-HI-Marketplace-YourCardHub-cirr"}

Tags (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| spath
| spath input=additional.Messages{}.Body
| stats count by statusReason

shashaikhhh
Explorer

What a legend! thank you!

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...