Getting Data In

How to write parsing configuration for json file?

vin02ptl
Explorer

My log contains multiple {} data structure and i want to get all json field inside extracted field in splunk . How to parse?

{ [-]
service: [ [-]
{ [-]
name: xxxxx

id: xxx
}

]

Filename: xxx

dest: xxx

created_at: xxxx
destination_port: null

source: xxx

username: zxx
}

0 Karma

arjunpkishore5
Motivator

props.conf with KV_MODE set to JSON should do the trick for you

Documentation on props.conf here - https://docs.splunk.com/Documentation/Splunk/latest/Admin/Propsconf

0 Karma

vin02ptl
Explorer

i have tried, but fields are not reflecting under interesting field

0 Karma

arjunpkishore5
Motivator

what are the fields showing up in Interesting fields ?

0 Karma

vin02ptl
Explorer

Filename: xxx
dest: xxx
created_at: xxxx
destination_port: null
source: xxx
username: zxx

above fields are not populating and time and date field which i have added those only populating

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...