Splunk Search

How to write a search to get the counts of values in a JSON array and show the average ResponseTime by value?

jmenziessmith
Engager

I am trying to write a search that will give me counts of each value occurrence within an array in JSON.

My truncated JSON that is logged looks like this:

{
    "TimestampUtc": "2015-12-14T17:48:22.9603567Z",
    "Request": {
        "Body": {
            "SelectedColumns": [{
                "ColumnId": 1004
            }, {
                "ColumnId": 1000
            }, {
                "ColumnId": 1003
            }, {
                "ColumnId": 1107
            }, {
                "ColumnId": 1101
            }]
        }
    },
    "Metrics": {
        "ResponseTime": 199
    }
}

I need to show a table of ColumnIdValue Count where ColumnIdValue is the value of ColumnId, and Count is the number of times that value appears in the JSON events.

I'm not sure how to go about this. Does mvexpand help here?

I'd also like to then write a second search which will show the average ResponseTime by ColumnIdValue.

Thanks

0 Karma
1 Solution

jmenziessmith
Engager

Ive worked out how to do the first part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats count(ColumnId) as count by ColumnId 
| table  ColumnId, count 
| sort -count

And the second part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats avg(Metrics.ResponseTime) as responsetime by ColumnId 
| table  ColumnId, responsetime
| sort -responsetime

View solution in original post

0 Karma

jmenziessmith
Engager

Ive worked out how to do the first part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats count(ColumnId) as count by ColumnId 
| table  ColumnId, count 
| sort -count

And the second part

source="*reportingservice.log.json"   User.OrganizationId=* 
| mvexpand Request.Body.SelectedColumns{}.ColumnId 
| rename Request.Body.SelectedColumns{}.ColumnId as ColumnId  
| stats avg(Metrics.ResponseTime) as responsetime by ColumnId 
| table  ColumnId, responsetime
| sort -responsetime
0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...