Getting Data In

Cloudtrail JSON logs do not ingest into splunk in a usable manner. How to parse correctly?

thisissplunk
Builder

The cloudtrail event exports are in JSON with fields, which is great. However, each event has a top level empty piece to the structure that forces you to expand the entire event when looking at it in the gui (the + symbol). It also makes searching on fields incredibly difficult.

Is there some app or way to remove that parent level JSON bit with Splunk itself as it ingests? Currently we do it with a python script, but it takes forever to decompress, parse and the compress again.

0 Karma
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...