Getting Data In

How to create custom source type to add metadata fields to each row and parse an array?

maayan
Path Finder

Hi,

following ticket: https://community.splunk.com/t5/Splunk-Search/Join-all-objects-with-specific-object-within-the-same-...

I have a JSON file (key-val structure). I need to create a source type in Splunk enterprise website(I don't have access to the config files). 

Each file include one array called Payloads and metadata header. Payloads includes events. each event has Header+Payload. 
i need to parse the json so each row represent one event and meta data fields will be added to each row.
(metadata fields values are the same for all events in one file).

Example for json:
{
"MetaData": {
"HostName": "host name"
},
"Payloads": [
{
"Header": {
"Type": "Event 1",
"Name": "event name 1",
"TimeStamp": 133299573877857753
},
"Payload": {
"Scan Start Timestamp": 133299573845207001,
"Scan Complete Timestamp": 133299573877857728
}
},
{
"Header": {
"Type": "Event 2",
"Name": "event name 2",
"TimeStamp": 133207765527670215
},
"Payload": {
"MAC Address": "A7",
"Information": {
"APM": "blabla"
},
"CT": "bla",
"LInformation": [
{
"ID": 1
}
],
"CE Parameters": {
"AR Timestamp": 133207765527630372,
"AsR Frame": [ 0, 0, 48, 0, 74, 0 ]
}
}
}
]
}

which definitions should i use in edit source type?

maayan_0-1686818360202.png

maayan_1-1686818376199.png

thanks





Labels (1)
0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...