<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I fine tune a JSON extraction from inside a log file using the &amp;quot;add data&amp;quot; wizard? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411645#M72883</link>
    <description>&lt;P&gt;Hello Skalliger, Thank you for your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Thank you it works better, although i still have some event that are not taken. But i found the problem. When i import my data with the "add data" wizard, by letting the &lt;STRONG&gt;&lt;EM&gt;"line break"&lt;/EM&gt;&lt;/STRONG&gt; in &lt;STRONG&gt;auto&lt;/STRONG&gt; i got the same amount of event when i import my file with the configuration files. But as i say, some event are "merged" together so i don't have all the events. &lt;/P&gt;

&lt;P&gt;Always in "add data" wizard, if i select &lt;STRONG&gt;&lt;EM&gt;"every line"&lt;/EM&gt;&lt;/STRONG&gt; instead of &lt;STRONG&gt;&lt;EM&gt;"auto"&lt;/EM&gt;&lt;/STRONG&gt; in &lt;STRONG&gt;"Line break"&lt;/STRONG&gt; it works (i got all my event separated correctly. So, how can I translate this part in the config file. I guess the modification is in the transforms.conf?&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;edit:&lt;/STRONG&gt; i found it : in props.conf add &lt;EM&gt;SHOULD_LINEMERGE = false&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Thank you again for your time.&lt;BR /&gt;
Thibaut&lt;/P&gt;</description>
    <pubDate>Wed, 28 Nov 2018 10:25:43 GMT</pubDate>
    <dc:creator>tmaire2</dc:creator>
    <dc:date>2018-11-28T10:25:43Z</dc:date>
    <item>
      <title>How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411636#M72874</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;

&lt;P&gt;I have a Log file with JSON format in it like this :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;12:48:12.3194 Info {"message":"Test ListOfEmails execution started","level":"Information","logType":"Default","timeStamp":"2018-11-12T12:48:12.0992011+01:00","fingerprint":"fingerprintID","windowsIdentity":"WindowsIdentity_name","machineName":"machine_name","processName":"Test ListOfEmails","processVersion":"1.0.0.0","jobId":"name_of_the_job","robotName":"name_of_the_robot","machineId":44111,"fileName":"Main"}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When i imported this file (manually) with the Splunk "Add data" wizard, it didn't auto discover the fields in the JSON part. So i try to use the "Extract Fields" to extract my fields. It works for some of the fields but not for all of them (like "machineId" and fileName"). When I try to extract multiple fields in once and field one by one, I get the same results; it throws me this error :&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;"The extraction failed. If you are extracting multiple fields, try removing one or more fields. Start with extractions that are embedded within longer text strings."&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Then i try to do my own Regex :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;^(?:[^ \n]* ){2}\{"\w+":"(?P&amp;lt;message&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;level&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;logType&amp;gt;\w+)(?:[^"\n]*"){8}(?P&amp;lt;fingerprint&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;windowsIdentity&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;machineName&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;processName&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;processVersion&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;jobId&amp;gt;[^"]+)[^:\n]*:"(?P&amp;lt;robotName&amp;gt;[^"]+)[^:\n]*:(?P&amp;lt;machineId&amp;gt;[^",]+)[^:\n]*:"(?P&amp;lt;fileName&amp;gt;[^"]+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It work (it extract all my field except some of them with very long message) until i write the last part for the "fileName" and give me this error :&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Error in 'rex' command: regex="(?ms)^(?:[^ \n]&lt;/EM&gt; ){2}{"\w+":"(?P[^"]+)[^:\n]&lt;EM&gt;:"(?P[^"]+)[^:\n]&lt;/EM&gt;:"(?P\w+)(?:[^"\n]&lt;EM&gt;"){8}(?P[^"]+)[^:\n]&lt;/EM&gt;:"(?P[^"]+)[^:\n]&lt;EM&gt;:"(?P[^"]+)[^:\n]&lt;/EM&gt;:"(?P[^"]+)[^:\n]&lt;EM&gt;:"(?P[^"]+)[^:\n]&lt;/EM&gt;:"(?P[^"]+)[^:\n]&lt;EM&gt;:"(?P[^"]+)[^:\n]&lt;/EM&gt;:(?P[^",]+)[^:\n]*:"(?P[^"]+)" has exceeded configured match_limit, consider raising the value in limits.conf&lt;/STRONG&gt;*&lt;/P&gt;

&lt;P&gt;Afteward, i try to remove this part &lt;STRONG&gt;&lt;EM&gt;"12:48:12.3194 Info "&lt;/EM&gt;&lt;/STRONG&gt; in order to only have the JSON format and it works like a charm with the field auto discovery (no need to use the "Extract fields").&lt;/P&gt;

&lt;P&gt;Is there a way in the "Add data" wizard to remove this part "12:48:12.3194 Info ". In order to only keep JSON? Is that a good way to do that? Or maybe there is another way to transform my logs that i didn't think of?&lt;/P&gt;

&lt;P&gt;Thank you by advance for your replies,&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Thibaut&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 14:44:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411636#M72874</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-26T14:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411637#M72875</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;nope, there is no way to tune the JSON discovery. However, you can cut the _raw before the fields get extracted.&lt;BR /&gt;
You would want to do something like this in your props.conf and transforms.conf:&lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[your_sourcetype]
# call it whatever you like (TRANSFORM-example)
TRANSFORM-json = json_cut
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[json_cut]
DEST_KEY = _raw
REGEX = (?:^(\d+\:){2}\d+\.\d+\s\w+\s)(?&amp;lt;json&amp;gt;[^\}]+\})
FORMAT = $1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You may want to tune this RegEx. I just took your example event and matched it.&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 17:17:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411637#M72875</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2018-11-26T17:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411638#M72876</link>
      <description>&lt;P&gt;Hi skalliger,&lt;/P&gt;

&lt;P&gt;Thanks for your response !&lt;/P&gt;

&lt;P&gt;Do i modify theses files in the default or local directory? (sorry i'm quite new with theses conf files) and after that how can i find these modification in the "add data" wizard (to apply my sourcetype to the logfile)?&lt;/P&gt;

&lt;P&gt;Thibaut&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 08:50:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411638#M72876</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-27T08:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411639#M72877</link>
      <description>&lt;P&gt;hello skalliger,&lt;/P&gt;

&lt;P&gt;Thanks for your response ! &lt;/P&gt;

&lt;P&gt;Do i modify theses files in the default or local directory? (sorry i'm quite new at theses config files) and after that, how can i see theses modification (select my new sourcetype) in "add data" wizard because even if I modifiy props.conf and transform.conf in the local or default directory i still can't see my new sourcetype ? &lt;BR /&gt;
I must be doing something wrong.&lt;/P&gt;

&lt;P&gt;Thank you,&lt;BR /&gt;
Thibaut&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 10:35:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411639#M72877</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-27T10:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411640#M72878</link>
      <description>&lt;P&gt;You want to do your modifications inside the local directory. If the files don't exist yet, create them.&lt;BR /&gt;
The JSON must be read somehwere. For example from a monitor of a Universal Forwarder or something else. When defining your inputs.conf to get your data in, you should always define an index and a sourcetype.&lt;BR /&gt;
This sourcetype is it where we refer to from props.conf and transforms.conf.&lt;/P&gt;

&lt;P&gt;Did that answer your question?&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 10:43:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411640#M72878</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2018-11-27T10:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411641#M72879</link>
      <description>&lt;P&gt;Thank you Skalliger, it's very clear with a UF. The thing is we don't have a Splunk infrastructure yet (i use the free license on my machine without any UF or HF) so for now i just want to understand how to properly get data in. All my log are on my computer and i import them with the "Add data" wizard.&lt;/P&gt;

&lt;P&gt;So, if i'm right, i first need to create an Index (or i can use the default one?) and a sourcetype in the Inputs.conf on my machine where Splunk is installed. Modify props and transforms files and indicate the sourcetype previously created in the inputs.conf. After that, i will see my sourcetype in the "add wizard" with the correct transformation applied on my logs?&lt;/P&gt;

&lt;P&gt;Thanks for your time,&lt;BR /&gt;
Thibaut&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 12:39:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411641#M72879</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-27T12:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411642#M72880</link>
      <description>&lt;P&gt;It's working but not completely. some of the events are not present.&lt;/P&gt;

&lt;P&gt;It work for :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    09:54:34.1821 Info {"message":"UiPath_REFrameWork_UiDemo execution started","level":"Information","logType":"Default","timeStamp":"2018-10-08T09:54:34.0170959+02:00","fingerprint":"0fcfd8d0-ad31-47fd-b240-c1ddc9fd4169","windowsIdentity":"name","machineName":"DCPJQQ2","processName":"UiPath_REFrameWork_UiDemo","processVersion":"1.0.0.0","jobId":"252fbec2-83d3-4f01-b165-5c728b850989","robotName":"DCPJQQ2","machineId":44772,"fileName":"System1_login"}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But not for :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09:55:11.0503 Info {"message":"UiPath_REFrameWork_UiDemo execution started","level":"Information","logType":"Default","timeStamp":"2018-10-08T09:55:10.9611418+02:00","fingerprint":"41543e91-d14f-48d3-ac9a-d53b3a3c33da","windowsIdentity":"name","machineName":"DCPJQQ2","processName":"UiPath_REFrameWork_UiDemo","processVersion":"1.0.0.0","jobId":"54bea4fe-da6c-4c55-aec3-019bd57b037b","robotName":"DCPJQQ2","machineId":44772,"fileName":"InitAllApplications"}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;14:11:05.6823 Info {"message":"UiPath_REFrameWork_UiDemo execution ended","level":"Information","logType":"Default","timeStamp":"2018-10-08T14:11:05.6874037+02:00","fingerprint":"325d2ba7-f8a2-440d-9e8a-70bf6103008a","windowsIdentity":"name","machineName":"DCPJQQ2","processName":"UiPath_REFrameWork_UiDemo","processVersion":"1.0.0.0","jobId":"4f6ac200-c4cc-4562-953d-33c7f1e3b00e","robotName":"DCPJQQ2","machineId":44772,"totalExecutionTimeInSeconds":1,"totalExecutionTime":"00:00:01","fileName":"Main"}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or : &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09:54:34.6757 Error {"message":"Invoke Workflow File: Cannot create unknown type '{http://schemas.uipath.com/workflow/activities}GetSecureCredential'.","level":"Error","logType":"Default","timeStamp":"2018-10-08T09:54:34.6747442+02:00","fingerprint":"1953d68a-44f3-4b9f-b10d-df026d4b941e","windowsIdentity":"name","machineName":"DCPJQQ2","processName":"UiPath_REFrameWork_UiDemo","processVersion":"1.0.0.0","jobId":"252fbec2-83d3-4f01-b165-5c728b850989","robotName":"DCPJQQ2","machineId":44772,"fileName":"System1_login"}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The last one i guess is a regex problem because of the "&lt;STRONG&gt;}&lt;/STRONG&gt;" in the "message" but for the rest i don't know why Splunk don't take them because they are very similar from the first one.&lt;/P&gt;

&lt;P&gt;Thanks for the help&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 14:47:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411642#M72880</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-27T14:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411643#M72881</link>
      <description>&lt;P&gt;As mentioned before, you always want to set an index and a sourcetype. You don't want to use the main index. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;That's correct, define the data inputs in inputs.conf, create an index in indexes.conf and here you go.&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 09:29:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411643#M72881</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2018-11-28T09:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411644#M72882</link>
      <description>&lt;P&gt;Oh, I didn't see those extra braces. Sorry, then we make it a little bit easier:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?=\{)(?&amp;lt;json&amp;gt;\{[^(\n||\r\n)]+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will match until the end of the line (\r or \r\n), because your JSON should end with a closing brace.&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 09:35:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411644#M72882</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2018-11-28T09:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411645#M72883</link>
      <description>&lt;P&gt;Hello Skalliger, Thank you for your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Thank you it works better, although i still have some event that are not taken. But i found the problem. When i import my data with the "add data" wizard, by letting the &lt;STRONG&gt;&lt;EM&gt;"line break"&lt;/EM&gt;&lt;/STRONG&gt; in &lt;STRONG&gt;auto&lt;/STRONG&gt; i got the same amount of event when i import my file with the configuration files. But as i say, some event are "merged" together so i don't have all the events. &lt;/P&gt;

&lt;P&gt;Always in "add data" wizard, if i select &lt;STRONG&gt;&lt;EM&gt;"every line"&lt;/EM&gt;&lt;/STRONG&gt; instead of &lt;STRONG&gt;&lt;EM&gt;"auto"&lt;/EM&gt;&lt;/STRONG&gt; in &lt;STRONG&gt;"Line break"&lt;/STRONG&gt; it works (i got all my event separated correctly. So, how can I translate this part in the config file. I guess the modification is in the transforms.conf?&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;edit:&lt;/STRONG&gt; i found it : in props.conf add &lt;EM&gt;SHOULD_LINEMERGE = false&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Thank you again for your time.&lt;BR /&gt;
Thibaut&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 10:25:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411645#M72883</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-28T10:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411646#M72884</link>
      <description>&lt;P&gt;Thanks for the feedback. Woud be nice however, if you could accept my answer as the answer to the question. I'm trying to get a free .conf pass next year. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Skalli&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 11:02:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411646#M72884</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2018-11-29T11:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do I fine tune a JSON extraction from inside a log file using the "add data" wizard?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411647#M72885</link>
      <description>&lt;P&gt;Thank you for your time and help :). I accept your answer, is that ok now?&lt;/P&gt;

&lt;P&gt;Thibaut&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 12:07:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-fine-tune-a-JSON-extraction-from-inside-a-log-file/m-p/411647#M72885</guid>
      <dc:creator>tmaire2</dc:creator>
      <dc:date>2018-11-29T12:07:44Z</dc:date>
    </item>
  </channel>
</rss>

