Getting Data In

Why Does JSON Logging Make Queries Slower?

splunkqy
Explorer

I was previously logging my API requests and responses as strings. So my logs would show:

Request: {"name": "Joe", "age": "4", ...}

And the entirety of {"name": "Joe", "age": "4", ...} is a string.

In order to get the information out, I had to parse the string with regexes.

I wanted to log this with Splunk fields though. So I began logging the JSON, and my logs showed:

Request:
  name: Joe
  age: 4

The problem is that my queries now take MUCH longer. I have to search for Request.name instead of using regexes to get the name. Does anyone know why it's taking so much longer?

Tags (2)
0 Karma

koshyk
Super Champion

We have plenty of data coming in json, and we haven't detected it not that slow. some possible checks you could do:
1. are you indexing JSON (determining it as structured format) during indextime or search time?
2. Do NOT index data into another format. Just index as pure JSON and extract required fields at searchtime
3. You don't need regexes to parse JSON if you have indexed it correctly. or alternatively you can use spath command do do during search time
4. Sometimes it may not be pure JSON? Please validate your whole event into JSON validator/parser checker

If you put the original data and your props/transforms, then we can pinpoint the correct config

splunkqy
Explorer

I did not know there was a difference in the time of indexing. I'll look into that for #1.

4 - it is pure JSON.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...