Getting Data In

Need some help with FIELD_HEADER_REGEX and json data

korstiaans
Explorer

Hi Splunkers, 

I have a question related to a json file that I'm trying to parse.I want to remove the first part of it until {"kind"), see sample file is added below. 

I tried using the FIELD_REGEX_HEADER in props.conf which I think is supposed to that so far I've tried an failed with the following:

FIELD_HEADER_REGEX={"activities":\s\[(.)
FIELD_HEADER_REGEX={"activities":\s\[
FIELD_HEADER_REGEX={"activities":
FIELD_HEADER_REGEX=\{\"activities\"\:

Some of the above work on regexr.com with the sample data. 

{"activities": [{"kind": "admin#reports#activity", "id": {"time": "2022-07-18T14:04:19.866Z", "uniqueQualifier": "-2451221827967636314", "applicationName": "redacted", "customerId": "redacted"}, "etag": "\"dng2uCItaXPqmMj2MG4RUqVkRjnE_4kf0VvQ0_WkiTg/6j3Reg7FneLgLDfjE-lZuZUOrdc\"", "actor": {"callerType": "USER", "email": "redacted", "profileId": "redacted"}, "ipAddress": "redacted", "events": [{"type": "SECURITY_INVESTIGATION", "name": "SECURITY_INVESTIGATION_QUERY", "parameters": [{"name": "INVESTIGATION_DATA_SOURCE", "value": "USER LOG EVENTS"}, {"name": "INVESTIGATION_QUERY", "value": "(empty)"}]}]},

Any help is appreciated thank you!

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @korstiaans,

I had a problem like your and I solved with SEDCMD:

SEDCMD-remove_header = s/\{\"activities\": \[\{\"kind\".*/\[\{\"kind\".*/flags

But before this, did you tried the spath command?

I think that should solve your need..

Ciao.

Giuseppe

0 Karma

korstiaans
Explorer

Unfortunately it didn't work for completeness sake I've added the props.conf I used.

[gws:test]
KV_MODE= json
LINE_BREAKER = }]},(.)
SEDCMD-remove_header =SEDCMD-remove_header = s/\{\"activities\": \[\{\"kind\".*/\[\{\"kind\".*/flags
disabled=false
pulldown_type=true
SHOULD_LINEMERGE = false

 

0 Karma

korstiaans
Explorer

Hi Giuseppe,

Thanks for the quick response, so it's only a problem for the first line I managed to split the other events and they are indexes as json so no need for spath. 

I'll try your SEDCMD suggestion and get back with the results. 

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...