Deployment Architecture

Splunk universal forwarder

vj5
New Member

Developers are sending a log in json format. But splunkforwarder is reading the log as single line text.
What migt the issue ?. Any help is appreciated.
Thanks in advance

Tags (1)
0 Karma

ddrillic
Ultra Champion

Try What are the requirements for a perfect Splunk JSON document?

You might need in props.conf -

INDEXED_EXTRACTIONS = json
category = Structured
0 Karma

vj5
New Member

@ddrillic and @amifath Thanks for you responses.

Now I am getting my log as
{ [-]
log: {someinformation of appication here {msg"a":"1","b":"2","c":"3","d":"4"
}

I want my log to be as below
{ [-]
log: {someinformation of appication here {msg-"a":"1","b":"2","c":"3","d":"4"}
}
msg-{
a:1
b:2
c:3
d:4
}

Devlopers are passing the log as json format but when it coming into splunk ui it is converting into invalid JSON.

0 Karma

amiftah
Communicator

If you mean one event by single line text and your json file has one node then it's normal to have that result, try to use spath command to extract more fields:
http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/Spath

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...