Splunk Search

Search xml data

Harshi1993
New Member

I have logs in the format of json where message is the key and message contains the value mentioned below

 

message: 

<ErrorMessage>E-delivery failed<ErrorMessage>

When i am searching like below in the splunk, able to search the events

index="*" source="*" "E-delivery failed"

If i want to display the count of E-delivery failed string, the results are not fetching as the value under message tag is xml.

Query used is:

index="*" source="*"
| eval type=case(like(message, "%E-delivery failed%"),"e delivery failed")|stats count as Results by type

With the above query not able to get any results. Please help me with the query.

 

Result should be:

type                                  count

e delivery failed             10

 

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Has the message field already been extracted, e.g. does this produce the expected results

index="*" source="*" | stats count by message

If not, either extract the field with spath for example, or use _raw in the like function

index="*" source="*"
| eval type=case(like(_raw, "%E-delivery failed%"),"e delivery failed")|stats count as Results by type
0 Karma

Harshi1993
New Member

Can't we use message field directly in the case statement. Do we need to use the _raw field in the case statement?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Yes, you can if it has been extracted. I gave an example for the situation where it hadn't been extracted.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...