Splunk Search

Log Metrics and use on dashboard

nehasha3
New Member

I have a case where the we have some associated metric for each request/response event , something like below:

{
"Key1" : "val",
"Array12" : [
"val1",
"val2"
],
"NewList" : [
{
"K1":"v11",
"K2":"v12",
"K3":"v13"
},
{
"K1":"v21",
"K2":"v22",
"K3":"v23"
}
]
}


Now this list , NewList is too big and having key-val pairs is making the log very bulky.

Is there any way to make it consize and they be able to read this in a dashboard as below

K1 , K2 , K3
V11,V12,V13
V21,V22,V23

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Do you mean something like this?

| spath NewList{} output=NewList
| table NewList
| mvexpand NewList
| spath input=NewList
| fields - NewList
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...