<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Field extraction json format in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704089#M238618</link>
    <description>&lt;P&gt;Please help me to get these logs in a way that it provides all the fields please...&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Nov&lt;/SPAN&gt; &lt;SPAN class=""&gt;9&lt;/SPAN&gt; &lt;SPAN class=""&gt;17:34:28&lt;/SPAN&gt; &lt;SPAN class=""&gt;128.160.82.28&lt;/SPAN&gt; [&lt;SPAN class=""&gt;local0.warning&lt;/SPAN&gt;] &amp;lt;&lt;SPAN class=""&gt;132&lt;/SPAN&gt;&amp;gt;&lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;2024-11-09T17:34:28.436542Z&lt;/SPAN&gt; &lt;SPAN class=""&gt;AviVantage&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;v-epswafhic2-wdc.hc.cloud.uk.hc&lt;/SPAN&gt;-443&lt;/SPAN&gt; &lt;SPAN class=""&gt;NILVALUE&lt;/SPAN&gt; &lt;SPAN class=""&gt;NILVALUE&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; {"&lt;SPAN class=""&gt;adf&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:true&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;significant&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;udf&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;virtualservice&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;virtualservice-4583863f-48a3-42b9-8115-252a7fb487f5&lt;/SPAN&gt;","&lt;SPAN class=""&gt;report_timestamp&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;2024-11-09T17:34:28.436542Z&lt;/SPAN&gt;","&lt;SPAN class=""&gt;service_engine&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;GB-DRN-AB-Tier2-se-vxeuz&lt;/SPAN&gt;","&lt;SPAN class=""&gt;vcpu_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;log_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:10181&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.12.73.92&lt;/SPAN&gt;","&lt;SPAN class=""&gt;client_src_port&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:44908&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_dest_port&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:443&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_rtt&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;http_version&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;1.1&lt;/SPAN&gt;","&lt;SPAN class=""&gt;method&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;HEAD&lt;/SPAN&gt;","&lt;SPAN class=""&gt;uri_path&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;/path/to/monitor/page/&lt;/SPAN&gt;","&lt;SPAN class=""&gt;host&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;udg1704n01.hc.cloud.uk.hc&lt;/SPAN&gt;","&lt;SPAN class=""&gt;response_content_type&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;text/html&lt;/SPAN&gt;","&lt;SPAN class=""&gt;request_length&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:93&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_length&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:94&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_code&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:400&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_time_first_byte&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_time_last_byte&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;compression_percentage&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;compression&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"","&lt;SPAN class=""&gt;client_insights&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"","&lt;SPAN class=""&gt;request_headers&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:3&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_headers&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:12&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;request_state&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;AVI_HTTP_REQUEST_STATE_READ_CLIENT_REQ_HDR&lt;/SPAN&gt;","&lt;SPAN class=""&gt;significant_log&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;["&lt;SPAN class=""&gt;ADF_HTTP_BAD_REQUEST_PLAIN_HTTP_REQUEST_SENT_ON_HTTPS_PORT&lt;/SPAN&gt;","&lt;SPAN class=""&gt;ADF_RESPONSE_CODE_4XX&lt;/SPAN&gt;"],"&lt;SPAN class=""&gt;vs_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.160.71.14&lt;/SPAN&gt;","&lt;SPAN class=""&gt;request_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;61e-RDl6-OZgZ&lt;/SPAN&gt;","&lt;SPAN class=""&gt;max_ingress_latency_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;avg_ingress_latency_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;conn_est_time_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;source_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.12.73.92&lt;/SPAN&gt;","&lt;SPAN class=""&gt;vs_name&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;v-epswafhic2-wdc.hc.cloud.uk.hc&lt;/SPAN&gt;-443&lt;/SPAN&gt;","&lt;SPAN class=""&gt;tenant_name&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;admin&lt;/SPAN&gt;"}&lt;/P&gt;</description>
    <pubDate>Mon, 11 Nov 2024 13:44:24 GMT</pubDate>
    <dc:creator>splunklearner</dc:creator>
    <dc:date>2024-11-11T13:44:24Z</dc:date>
    <item>
      <title>Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704089#M238618</link>
      <description>&lt;P&gt;Please help me to get these logs in a way that it provides all the fields please...&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Nov&lt;/SPAN&gt; &lt;SPAN class=""&gt;9&lt;/SPAN&gt; &lt;SPAN class=""&gt;17:34:28&lt;/SPAN&gt; &lt;SPAN class=""&gt;128.160.82.28&lt;/SPAN&gt; [&lt;SPAN class=""&gt;local0.warning&lt;/SPAN&gt;] &amp;lt;&lt;SPAN class=""&gt;132&lt;/SPAN&gt;&amp;gt;&lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;2024-11-09T17:34:28.436542Z&lt;/SPAN&gt; &lt;SPAN class=""&gt;AviVantage&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;v-epswafhic2-wdc.hc.cloud.uk.hc&lt;/SPAN&gt;-443&lt;/SPAN&gt; &lt;SPAN class=""&gt;NILVALUE&lt;/SPAN&gt; &lt;SPAN class=""&gt;NILVALUE&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; {"&lt;SPAN class=""&gt;adf&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:true&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;significant&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;udf&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;virtualservice&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;virtualservice-4583863f-48a3-42b9-8115-252a7fb487f5&lt;/SPAN&gt;","&lt;SPAN class=""&gt;report_timestamp&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;2024-11-09T17:34:28.436542Z&lt;/SPAN&gt;","&lt;SPAN class=""&gt;service_engine&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;GB-DRN-AB-Tier2-se-vxeuz&lt;/SPAN&gt;","&lt;SPAN class=""&gt;vcpu_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;log_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:10181&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.12.73.92&lt;/SPAN&gt;","&lt;SPAN class=""&gt;client_src_port&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:44908&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_dest_port&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:443&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;client_rtt&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;http_version&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;1.1&lt;/SPAN&gt;","&lt;SPAN class=""&gt;method&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;HEAD&lt;/SPAN&gt;","&lt;SPAN class=""&gt;uri_path&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;/path/to/monitor/page/&lt;/SPAN&gt;","&lt;SPAN class=""&gt;host&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;udg1704n01.hc.cloud.uk.hc&lt;/SPAN&gt;","&lt;SPAN class=""&gt;response_content_type&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;text/html&lt;/SPAN&gt;","&lt;SPAN class=""&gt;request_length&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:93&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_length&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:94&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_code&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:400&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_time_first_byte&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_time_last_byte&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;compression_percentage&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;compression&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"","&lt;SPAN class=""&gt;client_insights&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"","&lt;SPAN class=""&gt;request_headers&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:3&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;response_headers&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:12&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;request_state&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;AVI_HTTP_REQUEST_STATE_READ_CLIENT_REQ_HDR&lt;/SPAN&gt;","&lt;SPAN class=""&gt;significant_log&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;["&lt;SPAN class=""&gt;ADF_HTTP_BAD_REQUEST_PLAIN_HTTP_REQUEST_SENT_ON_HTTPS_PORT&lt;/SPAN&gt;","&lt;SPAN class=""&gt;ADF_RESPONSE_CODE_4XX&lt;/SPAN&gt;"],"&lt;SPAN class=""&gt;vs_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.160.71.14&lt;/SPAN&gt;","&lt;SPAN class=""&gt;request_id&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;61e-RDl6-OZgZ&lt;/SPAN&gt;","&lt;SPAN class=""&gt;max_ingress_latency_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;avg_ingress_latency_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:0&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;conn_est_time_fe&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:1&lt;/SPAN&gt;,"&lt;SPAN class=""&gt;source_ip&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;128.12.73.92&lt;/SPAN&gt;","&lt;SPAN class=""&gt;vs_name&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;v-epswafhic2-wdc.hc.cloud.uk.hc&lt;/SPAN&gt;-443&lt;/SPAN&gt;","&lt;SPAN class=""&gt;tenant_name&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;admin&lt;/SPAN&gt;"}&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 13:44:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704089#M238618</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T13:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704090#M238619</link>
      <description>&lt;P&gt;The sample event that you posted does not contain valid json. I presume this is a copy/paste error or other typo. Please repost the raw data from your event (anonymised as required) in a code block (using the &amp;lt;/&amp;gt; button above) to preserve formatting details.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 13:35:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704090#M238619</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-11-11T13:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704091#M238620</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;please check now&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 13:44:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704091#M238620</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T13:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704092#M238621</link>
      <description>&lt;LI-CODE lang="markup"&gt;| rex "(?&amp;lt;json&amp;gt;\{.*\})"
| spath input=json&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 11 Nov 2024 14:07:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704092#M238621</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-11-11T14:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704094#M238622</link>
      <description>&lt;P&gt;Thank you. It worked. One small doubt, will it be worked for upcoming new events also right? Is there any way to hide this in search rather than creating macro?&amp;nbsp;&lt;/P&gt;&lt;P&gt;and can we do it during on-boarding itself during index or search time extracti&lt;SPAN&gt;on? Please help me&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 14:50:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704094#M238622</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T14:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704099#M238624</link>
      <description>&lt;P&gt;We are having 3 indexers with 2 cluster managers and 3 SH with one Deployer. its multi site cluster. Please help me to configure this setting before on-boarding rather than spath command? Please tell me in detail how to perform?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 15:15:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704099#M238624</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T15:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704108#M238625</link>
      <description>&lt;P&gt;Unfortunately, for now Splunk cannot perform a structured data extraction if the whole event is not a structured data (in other words - if you have a json or XML data which has some header, like in your example, Splunk cannot automatically extract data from it).&lt;/P&gt;&lt;P&gt;There is an idea about it at &lt;A href="https://ideas.splunk.com/ideas/EID-I-208" target="_blank"&gt;https://ideas.splunk.com/ideas/EID-I-208&lt;/A&gt; - while it's already as "Future Prospect", you can give your vote to show your support for it.&lt;/P&gt;&lt;P&gt;At the moment the only thing you could do would be to cut the whole header away with SEDCMD during ingestion so that all that's left is a valid json structure. But that's not always what you want.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 18:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704108#M238625</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-11-11T18:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704109#M238626</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Then what is use of KV_MODE = json that needs to be given in props.conf (saw somewhere a while ago).&lt;/P&gt;&lt;P&gt;Please let me understand whether my data contains both json and xml or only json? Because when i am using spath command provided by&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;it extracted the fields... is it wrong? (if json and xml both present in my example event)&lt;/P&gt;&lt;P&gt;any idea on this?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 18:04:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704109#M238626</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T18:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704112#M238627</link>
      <description>&lt;P&gt;I mean that KV_MODE=something works only when the _whole event_ is just a blob of structured data. Without any additional parts to it.&lt;/P&gt;&lt;P&gt;So KV_MODE=json will work if your whole even consists of&lt;/P&gt;&lt;PRE&gt;{"my":"data","is":"json"}&lt;/PRE&gt;&lt;P&gt;but will not work if it's&lt;/P&gt;&lt;PRE&gt;&amp;lt;144&amp;gt;2014-11-11 11:23 Some lousy[24]: pseudo-syslog header with {"json":"data","further":"down","the":street"}&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Nov 2024 18:19:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704112#M238627</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-11-11T18:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704114#M238628</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;| rex "(?&amp;lt;json&amp;gt;\{.*\})"
| spath input=json​&lt;/PRE&gt;&lt;P&gt;so the above command works fine right for mixed pattern (json and xml) for my example? currently and for upcoming events? is there any other way to hide this query apart from macro?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 18:41:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704114#M238628</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-11T18:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction json format</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704144#M238634</link>
      <description>&lt;P&gt;Appreciated&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;. Please answer my last question&lt;/P&gt;&lt;PRE&gt;| rex "(?&amp;lt;json&amp;gt;\{.*\})"
| spath input=json​&lt;/PRE&gt;&lt;P&gt;so the above command works fine right for mixed pattern (json and xml) for my example? currently and for upcoming events? is there any other way to hide this query apart from macro?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2024 08:55:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-json-format/m-p/704144#M238634</guid>
      <dc:creator>splunklearner</dc:creator>
      <dc:date>2024-11-12T08:55:07Z</dc:date>
    </item>
  </channel>
</rss>

