Splunk Search

Log Metrics and use on dashboard

nehasha3
New Member

I have a case where the we have some associated metric for each request/response event , something like below:

{
"Key1" : "val",
"Array12" : [
"val1",
"val2"
],
"NewList" : [
{
"K1":"v11",
"K2":"v12",
"K3":"v13"
},
{
"K1":"v21",
"K2":"v22",
"K3":"v23"
}
]
}


Now this list , NewList is too big and having key-val pairs is making the log very bulky.

Is there any way to make it consize and they be able to read this in a dashboard as below

K1 , K2 , K3
V11,V12,V13
V21,V22,V23

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Do you mean something like this?

| spath NewList{} output=NewList
| table NewList
| mvexpand NewList
| spath input=NewList
| fields - NewList
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...