Getting Data In

search simple json

vashodha
Loves-to-Learn Lots

I tried many ways to generate a properly formated json for splunk to parse it so i can put some alerts on my data but  no  success yet  , nad the log is really simple 

 

2021-02-19T18:35:43,878Z [main] INFO dev-AniMatchIngester - { "createTS":"2021-02-19T10:35:43Z", "accountId":"333333", "correlationId":"1112222", "msgType":"raw_published", "Outcome":"Success", "eventOccurrenceTimestamp":"2020-01-14 08:12:07.111", "Type":"TEST", "eventType":"Success" }

 

I need to i deally want these fields in intresting fields section or at the least i should be able to do a meaning queries based on eventOccurrenceTimestamp  > today etc., or Type =="test" comparisons it was so easy in elk .  

Labels (1)
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...