Getting Data In

How to create custom source type to add metadata fields to each row and parse an array?

maayan
Path Finder

Hi,

following ticket: https://community.splunk.com/t5/Splunk-Search/Join-all-objects-with-specific-object-within-the-same-...

I have a JSON file (key-val structure). I need to create a source type in Splunk enterprise website(I don't have access to the config files). 

Each file include one array called Payloads and metadata header. Payloads includes events. each event has Header+Payload. 
i need to parse the json so each row represent one event and meta data fields will be added to each row.
(metadata fields values are the same for all events in one file).

Example for json:
{
"MetaData": {
"HostName": "host name"
},
"Payloads": [
{
"Header": {
"Type": "Event 1",
"Name": "event name 1",
"TimeStamp": 133299573877857753
},
"Payload": {
"Scan Start Timestamp": 133299573845207001,
"Scan Complete Timestamp": 133299573877857728
}
},
{
"Header": {
"Type": "Event 2",
"Name": "event name 2",
"TimeStamp": 133207765527670215
},
"Payload": {
"MAC Address": "A7",
"Information": {
"APM": "blabla"
},
"CT": "bla",
"LInformation": [
{
"ID": 1
}
],
"CE Parameters": {
"AR Timestamp": 133207765527630372,
"AsR Frame": [ 0, 0, 48, 0, 74, 0 ]
}
}
}
]
}

which definitions should i use in edit source type?

maayan_0-1686818360202.png

maayan_1-1686818376199.png

thanks





Labels (1)
0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...