<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic JSON Log - Search time field extraction not working on multi machine environment in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/JSON-Log-Search-time-field-extraction-not-working-on-multi/m-p/40812#M9435</link>
    <description>&lt;P&gt;I have a JSON format log file.&lt;/P&gt;

&lt;P&gt;When this is ingested by a single server installation of splunk (4.3.4), fields are correctly extracted at search time (and appear as interesting fields).  The following stanaza is used in the props.conf&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
KV_MODE=JSON&lt;BR /&gt;
TIME_FORMAT=%d/%m/%Y %T.%3N&lt;BR /&gt;
TIME_PREFIX = LogTimeStamp":"&lt;/P&gt;

&lt;P&gt;Moving to QA.  I have:&lt;BR /&gt;
1 Machine with a Heavy Forwader (stanza):&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
TIME_FORMAT=%d/%m/%Y %T.%3N&lt;BR /&gt;
TIME_PREFIX = LogTimeStamp":"&lt;/P&gt;

&lt;P&gt;1 Machine with the index and search head (stanza):&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
KV_MODE=JSON&lt;/P&gt;

&lt;P&gt;When the exact same log file is ingested,  the fields are not extracted, and I must use spath command in each search to force this extraction.&lt;/P&gt;

&lt;P&gt;what am i missing?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 12:50:30 GMT</pubDate>
    <dc:creator>rick_harrison</dc:creator>
    <dc:date>2020-09-28T12:50:30Z</dc:date>
    <item>
      <title>JSON Log - Search time field extraction not working on multi machine environment</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-Log-Search-time-field-extraction-not-working-on-multi/m-p/40812#M9435</link>
      <description>&lt;P&gt;I have a JSON format log file.&lt;/P&gt;

&lt;P&gt;When this is ingested by a single server installation of splunk (4.3.4), fields are correctly extracted at search time (and appear as interesting fields).  The following stanaza is used in the props.conf&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
KV_MODE=JSON&lt;BR /&gt;
TIME_FORMAT=%d/%m/%Y %T.%3N&lt;BR /&gt;
TIME_PREFIX = LogTimeStamp":"&lt;/P&gt;

&lt;P&gt;Moving to QA.  I have:&lt;BR /&gt;
1 Machine with a Heavy Forwader (stanza):&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
TIME_FORMAT=%d/%m/%Y %T.%3N&lt;BR /&gt;
TIME_PREFIX = LogTimeStamp":"&lt;/P&gt;

&lt;P&gt;1 Machine with the index and search head (stanza):&lt;BR /&gt;
[alarm_log]&lt;BR /&gt;
KV_MODE=JSON&lt;/P&gt;

&lt;P&gt;When the exact same log file is ingested,  the fields are not extracted, and I must use spath command in each search to force this extraction.&lt;/P&gt;

&lt;P&gt;what am i missing?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:50:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-Log-Search-time-field-extraction-not-working-on-multi/m-p/40812#M9435</guid>
      <dc:creator>rick_harrison</dc:creator>
      <dc:date>2020-09-28T12:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: JSON Log - Search time field extraction not working on multi machine environment</title>
      <link>https://community.splunk.com/t5/Splunk-Search/JSON-Log-Search-time-field-extraction-not-working-on-multi/m-p/40813#M9436</link>
      <description>&lt;P&gt;When you using a heavy forwarder, parsing happens on the forwarder. While I am pretty sure that the KV_MODE should apply only at search time, I wonder if you are missing something because it appears only on the search head / indexer.&lt;BR /&gt;
I would try adding the &lt;CODE&gt;KV_MODE=JSON&lt;/CODE&gt; to the heavy forwarder as well as the indexer/search head. It won't hurt to have it in two places. Try it and see if that works. There is really no down side.&lt;/P&gt;

&lt;P&gt;You might also consider installing the free Splunk on Splunk app (SoS). This would help you see all the places that might be affecting the configuration of the &lt;CODE&gt;alarm_log&lt;/CODE&gt; sourcetype. Or try &lt;CODE&gt;btool&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:17:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/JSON-Log-Search-time-field-extraction-not-working-on-multi/m-p/40813#M9436</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2020-09-28T13:17:54Z</dc:date>
    </item>
  </channel>
</rss>

