Getting Data In

How to use props.conf to parse json file in splunk

camellia
Engager

Hi

I am new to splunk. I set up a single-site cluster to parse a JSON-formatted log. I use cm in the path of /opt/splunk/etc/manager-apps/_cluster/local. conf and transforms.conf configuration files were sent to index in the path /opt/splunk/etc/peer-apps/_cluster/local. However, when I searched in the search header, the desired effect was not found.

props.conf

[itsd]
DATETIME_CONFIG = CURRENT
KV_MODE = json
LINE_BREAKER = ([\r\n]+)
category = Structured
disabled = false
pulldown_type = true
TRANSFORMS-null1 = replace_null
TRANSFORMS-null2 = replace_null1

 

transforms.conf

[replace_null]
REGEX = ^\[
DEST_KEY=queue
FORMAT=nullQueue

[replace_null1]
REGEX=(.*)(\}\s?\})
DEST_KEY=_raw
FORMAT=$1$2

Labels (2)
0 Karma
1 Solution

manjunathmeti
Champion

hi @camellia,

You need to configure these in the forwarder not on the indexer servers. Also,  KV_MODE = json is search time configuration, not index-time configuration.

Set INDEXED_EXTRACTIONS = JSON for your sourcetype in props.conf. Deploy props.conf and transforms.conf in your forwarder.

[itsd]
DATETIME_CONFIG = CURRENT
INDEXED_EXTRACTIONS = JSON
LINE_BREAKER = ([\r\n]+)
category = Structured
disabled = false
pulldown_type = true
TRANSFORMS-null1 = replace_null
TRANSFORMS-null2 = replace_null1

 

View solution in original post

manjunathmeti
Champion

hi @camellia,

You need to configure these in the forwarder not on the indexer servers. Also,  KV_MODE = json is search time configuration, not index-time configuration.

Set INDEXED_EXTRACTIONS = JSON for your sourcetype in props.conf. Deploy props.conf and transforms.conf in your forwarder.

[itsd]
DATETIME_CONFIG = CURRENT
INDEXED_EXTRACTIONS = JSON
LINE_BREAKER = ([\r\n]+)
category = Structured
disabled = false
pulldown_type = true
TRANSFORMS-null1 = replace_null
TRANSFORMS-null2 = replace_null1

 

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...