Getting Data In

JSON with Timestamp (syslog)

poisar
Explorer

Hello,

i am getting the following json via syslog and i ingest it to splunk.

Aug 13 12:45:40 10.200.7.200 {"Status": "Failed", "Received": "2020-08-13T10:45:07.2887421", "ToIP": null, "StartDate": "2020-08-13T10:44:39.530583Z", "Index": 2, "EndDate": "2020-08-13T10:45:39.530583Z", "FromIP": "2603:10a6:803:67::17"}

 

i want to extract the json data. So i created a new app on my searchhead with a props.conf for my custom sourcetype:

[security:type]
TIME_PREFIX = "Received":\s*"
# SEDCMD-strip_prefix = s/^[^{]+//g
SEDCMD-StripHeader = s/^[^\{]+//
INDEXED_EXTRACTIONS=JSON
KV_MODE=json
TZ = UTC

 

still it doesnt extract the json data. Can someone help me out?

 

thanks in advance!

Andreas

Labels (2)
Tags (1)
0 Karma

poisar
Explorer

Putting the props.conf on the indexer fixed my issue.

 

 

0 Karma
Get Updates on the Splunk Community!

2024 Splunk Career Impact Survey | Earn a $20 gift card for participating!

Hear ye, hear ye! The time has come again for Splunk's annual Career Impact Survey!  We need your help by ...

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...