Getting Data In

nxlog output (json in *.log) and Splunk

mazurmateusz
Engager

Hello,

Sysadmins set nxlog syslog to put event logs from windows to external directory.
The log format is 'json' with extension *.log
My question is how to properly import those data to splunk and index it.
Right now SPLUNK don't recognize all fields (like a EventType, EventID, Hostname etc.)

thanks in advance

Mateusz

0 Karma

mazurmateusz
Engager

Hello,

I made something like that:

Add to props.conf:

[Test_json]
INDEXED_EXTRACTIONS = json
KV_MODE = none
NO_BINARY_CHECK = 1
pulldown_type = 1

and restart SPLUNK

After restart try to upload file *.log
1. go to settings upload
2. pickup file
3. upload
4. choose Test_json as a source type
And then i got preview error which information 'change source type'.

Do you have any suggestion what i made wrong?

Regards,
M.

0 Karma

woodcock
Esteemed Legend

Before you use it, you need to define the sourcetype of Test_json by adding it to an inputs.conf file (or at the set sourcetype stage after Add Data when you use the GUI to do a New under Data Inputs -> Files & Directories, if you went that route).

0 Karma

woodcock
Esteemed Legend

It should be straightforward, just tell splunk to get the *.log files with inputs.conf and then tell it about json like it says here:

http://answers.splunk.com/answers/148307/how-to-parse-and-extract-json-log-files-in-splunk.html

Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...