Splunk Search

How to write a search to get the counts of values in a JSON array and show the average ResponseTime by value?

jmenziessmith
Engager

I am trying to write a search that will give me counts of each value occurrence within an array in JSON.

My truncated JSON that is logged looks like this:

{
    "TimestampUtc": "2015-12-14T17:48:22.9603567Z",
    "Request": {
        "Body": {
            "SelectedColumns": [{
                "ColumnId": 1004
            }, {
                "ColumnId": 1000
            }, {
                "ColumnId": 1003
            }, {
                "ColumnId": 1107
            }, {
                "ColumnId": 1101
            }]
        }
    },
    "Metrics": {
        "ResponseTime": 199
    }
}

I need to show a table of ColumnIdValue Count where ColumnIdValue is the value of ColumnId, and Count is the number of times that value appears in the JSON events.

I'm not sure how to go about this. Does mvexpand help here?

I'd also like to then write a second search which will show the average ResponseTime by ColumnIdValue.

Thanks

0 Karma
1 Solution

jmenziessmith
Engager

Ive worked out how to do the first part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats count(ColumnId) as count by ColumnId 
| table  ColumnId, count 
| sort -count

And the second part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats avg(Metrics.ResponseTime) as responsetime by ColumnId 
| table  ColumnId, responsetime
| sort -responsetime

View solution in original post

0 Karma

jmenziessmith
Engager

Ive worked out how to do the first part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats count(ColumnId) as count by ColumnId 
| table  ColumnId, count 
| sort -count

And the second part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats avg(Metrics.ResponseTime) as responsetime by ColumnId 
| table  ColumnId, responsetime
| sort -responsetime
0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...