Splunk Search

How to get multiple values from xml using xpath and spath?

ritesh14
Explorer

I am trying to get multiple values from xml as shows below

I have tried xpath and spath and both shows nothing

I am looking for ResponseCode, SimpleResponseCode and nResponseCode

here is the sample xml for reference

 

 

 

 

 

| makeresults 
| eval _raw="<?xml version=\"1.0\" encoding=\"utf-8\"?>
<soapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\">
    <soapenv:Body>
        <ns3:LogResponse xmlns:ns2=\"http://randomurl.com/sample1\"
                            xmlns:ns3=\"http://randomurl.com/sample2\">
            <ResponseCode>OK</ResponseCode>
            <State>Simple</State>
            <Transactions>
                <TransactionName>CHANGED</TransactionName>
            </Transactions>
            <Transactions>
                <TransactionData>CHANGE_SIMPLE</TransactionData>
            </Transactions>
            <ServerTime>1649691711637</ServerTime>
            <SimpleResponseCode>OK</SimpleResponseCode>
            <nResponseCode>
                <nResponseCode>OK</nResponseCode>
            </nResponseCode>
            <USELESS>VALUES</USELESS>
            <MORE_USELESS>false</MORE_USELESS>
        </ns3:LogResponse>
    </soapenv:Body>
</soapenv:Envelope>" 
| xpath outfield=

 

 

 

 

 

Labels (2)
Tags (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults 
| eval _raw="<?xml version=\"1.0\" encoding=\"utf-8\"?>
<soapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\">
    <soapenv:Body>
        <ns3:LogResponse xmlns:ns2=\"http://randomurl.com/sample1\"
                            xmlns:ns3=\"http://randomurl.com/sample2\">
            <ResponseCode>OK</ResponseCode>
            <State>Simple</State>
            <Transactions>
                <TransactionName>CHANGED</TransactionName>
            </Transactions>
            <Transactions>
                <TransactionData>CHANGE_SIMPLE</TransactionData>
            </Transactions>
            <ServerTime>1649691711637</ServerTime>
            <SimpleResponseCode>OK</SimpleResponseCode>
            <nResponseCode>
                <nResponseCode>OK</nResponseCode>
            </nResponseCode>
            <USELESS>VALUES</USELESS>
            <MORE_USELESS>false</MORE_USELESS>
        </ns3:LogResponse>
    </soapenv:Body>
</soapenv:Envelope>"
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.ResponseCode output=ResponseCode
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.SimpleResponseCode output=SimpleResponseCode
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.nResponseCode.nResponseCode output=nResponseCode

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults 
| eval _raw="<?xml version=\"1.0\" encoding=\"utf-8\"?>
<soapenv:Envelope xmlns:soapenv=\"http://schemas.xmlsoap.org/soap/envelope/\">
    <soapenv:Body>
        <ns3:LogResponse xmlns:ns2=\"http://randomurl.com/sample1\"
                            xmlns:ns3=\"http://randomurl.com/sample2\">
            <ResponseCode>OK</ResponseCode>
            <State>Simple</State>
            <Transactions>
                <TransactionName>CHANGED</TransactionName>
            </Transactions>
            <Transactions>
                <TransactionData>CHANGE_SIMPLE</TransactionData>
            </Transactions>
            <ServerTime>1649691711637</ServerTime>
            <SimpleResponseCode>OK</SimpleResponseCode>
            <nResponseCode>
                <nResponseCode>OK</nResponseCode>
            </nResponseCode>
            <USELESS>VALUES</USELESS>
            <MORE_USELESS>false</MORE_USELESS>
        </ns3:LogResponse>
    </soapenv:Body>
</soapenv:Envelope>"
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.ResponseCode output=ResponseCode
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.SimpleResponseCode output=SimpleResponseCode
| spath soapenv:Envelope.soapenv:Body.ns3:LogResponse.nResponseCode.nResponseCode output=nResponseCode
0 Karma
Get Updates on the Splunk Community!

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...

Alerting Best Practices: How to Create Good Detectors

At their best, detectors and the alerts they trigger notify teams when applications aren’t performing as ...

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...