<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: JSON, TCP Input and _meta in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182270#M36528</link>
    <description>&lt;P&gt;Nice. Thank you. Is there a way to limit what gets transformed into a fields please ? &lt;BR /&gt;
The KV_MODE addition to props.conf created 15000+ fields and I only really need about 20 of these.&lt;/P&gt;

&lt;P&gt;I use _meta in the default stanza in ./etc/system/local/inputs.conf through the forwarder when pushing computer logs. &lt;BR /&gt;
I would like to create/index the same fields when pushing json from my app through tcp.&lt;/P&gt;

&lt;P&gt;Thank you for your help!&lt;/P&gt;</description>
    <pubDate>Fri, 24 Oct 2014 23:06:18 GMT</pubDate>
    <dc:creator>jeanmatthieu</dc:creator>
    <dc:date>2014-10-24T23:06:18Z</dc:date>
    <item>
      <title>JSON, TCP Input and _meta</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182267#M36525</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;

&lt;P&gt;I'm sending a JSON document to a TCP Data Input on my Splunk server. &lt;BR /&gt;
I noticed the magical field _time that allows me to set the time stamp the event occurred on and was hoping I could use _meta to add fields to be indexed automatically.&lt;/P&gt;

&lt;P&gt;For example, is there a way to extract 'computer' and 'browser' fields from the below JSON automatically ?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{
    "_meta": "computer::MacBook Pro browser::Safari",
    "_time":"2014-10-24'T'11:59:01'Z'",
}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thank you for your help,&lt;BR /&gt;
Jean-Matthieu&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 12:19:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182267#M36525</guid>
      <dc:creator>jeanmatthieu</dc:creator>
      <dc:date>2014-10-24T12:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: JSON, TCP Input and _meta</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182268#M36526</link>
      <description>&lt;P&gt;Take a look at the &lt;CODE&gt;spath&lt;/CODE&gt; command &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.4/SearchReference/Spath"&gt;http://docs.splunk.com/Documentation/Splunk/6.1.4/SearchReference/Spath&lt;/A&gt; this should help you....&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 12:27:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182268#M36526</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-10-24T12:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: JSON, TCP Input and _meta</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182269#M36527</link>
      <description>&lt;P&gt;You should just use normal JSON fields and don't worry about &lt;CODE&gt;_meta&lt;/CODE&gt; as that's mainly for internal Splunk use. The entire JSON is already indexed, and if you set KV_MODE = json for the source/sourcetype in props.conf (on the search head), then Splunk will automatically do extractions on all JSON fields. Do you have any particular reason to want to create extra indexes for other fields?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 15:26:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182269#M36527</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2014-10-24T15:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: JSON, TCP Input and _meta</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182270#M36528</link>
      <description>&lt;P&gt;Nice. Thank you. Is there a way to limit what gets transformed into a fields please ? &lt;BR /&gt;
The KV_MODE addition to props.conf created 15000+ fields and I only really need about 20 of these.&lt;/P&gt;

&lt;P&gt;I use _meta in the default stanza in ./etc/system/local/inputs.conf through the forwarder when pushing computer logs. &lt;BR /&gt;
I would like to create/index the same fields when pushing json from my app through tcp.&lt;/P&gt;

&lt;P&gt;Thank you for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 23:06:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/JSON-TCP-Input-and-meta/m-p/182270#M36528</guid>
      <dc:creator>jeanmatthieu</dc:creator>
      <dc:date>2014-10-24T23:06:18Z</dc:date>
    </item>
  </channel>
</rss>

