Splunk Search

Search xml data

Harshi1993
New Member

I have logs in the format of json where message is the key and message contains the value mentioned below

 

message: 

<ErrorMessage>E-delivery failed<ErrorMessage>

When i am searching like below in the splunk, able to search the events

index="*" source="*" "E-delivery failed"

If i want to display the count of E-delivery failed string, the results are not fetching as the value under message tag is xml.

Query used is:

index="*" source="*"
| eval type=case(like(message, "%E-delivery failed%"),"e delivery failed")|stats count as Results by type

With the above query not able to get any results. Please help me with the query.

 

Result should be:

type                                  count

e delivery failed             10

 

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Has the message field already been extracted, e.g. does this produce the expected results

index="*" source="*" | stats count by message

If not, either extract the field with spath for example, or use _raw in the like function

index="*" source="*"
| eval type=case(like(_raw, "%E-delivery failed%"),"e delivery failed")|stats count as Results by type
0 Karma

Harshi1993
New Member

Can't we use message field directly in the case statement. Do we need to use the _raw field in the case statement?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Yes, you can if it has been extracted. I gave an example for the situation where it hadn't been extracted.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...

SplunkTrust Application Period is Officially OPEN!

It's that time, folks! The application/nomination period for the 2026-2027 SplunkTrust is officially open. If ...