Getting Data In

Key/Value pairs from json are not showing up as fields

xvxt006
Contributor

We have the events in the below format and i was thinking i would see the fields without any extraction. But that did not happen. Do you know why?

ReadyToSubmitToFraud
PROCESSING_ERROR
SubmittedToFraud

2013-09-05 15:55:02,403 INFO 10.81.193.150 [AbstractOrderSubmitJob] {"order_status_counts":{"Fraud":"69","ReadyToSubmitToFraud":"962","PROCESSING_ERROR":"0","SubmittedToFraud":"13979"}}

Tags (1)
0 Karma

jtworzydlo
Path Finder

The key/value pairs haven't been extracted because Splunk extracts automatically only key/value pairs in form: key=value.

0 Karma

xvxt006
Contributor

Thank you. I will read this doc.

0 Karma

lukejadamec
Super Champion

In short, you're using multiple delimiters in a single event, so Splunk needs a bit more information.

Try using spath in your search.

http://docs.splunk.com/Documentation/Splunk/5.0.3/SearchReference/Spath

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...