Deployment Architecture

Indexing JSON - problem

bugnet
Path Finder

Hi all,

I have json data that incoming from FIREEYE but can't parsing.
I'm working with cluster environment.

inputs.conf on the heavy forwarder:

Blockquote

[tcp://6012]
index=fire_eye
sourcetype=_json
disabled=0

Blockquote

The events shown in Splunk but not parsing.

Tags (1)
0 Karma

bugnet
Path Finder

Hi,

As I mentioned - I'm working with cluster environment.
accordingly, Where I need to edit the props.conf? in the cluster master?

0 Karma

aakwah
Builder

Hello,

I think you should assing json KV_MODE for your sourcetype, stantz like this in props.conf

[_json] 
KV_MODE = json

May be you need to set TIME_FORMAT and LINE_BREAKER as well.

If the above doesn't work thanks to send sample from log.

Regards

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...

Customer success is front and center at .conf25

Hi Splunkers, If you are not able to be at .conf25 in person, you can still learn about all the latest news ...

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...