Knowledge Management

How to auto extract fields from this log?

abhisplunk1
Explorer

 

Hi this is the log

{"time":"2023-06-13 20:35:02.046 +00:00", "level":"Information", "client":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.12.1.0Safari/537.36 Edg/xx.x.xx.x.x", "environment":"deduction", "user":"CORP\NBSWWUK", "clientIp":"xxx.xxx.xxx.xx", "processId":"24560", "processName":"w3wp", "machine":"mymachine", "version":"", "message":"", "log":"", "requestURL":"/request/v1/Application/getorganizations", "exception":"", "requestBody":"", "requestParam":"", "exceptionStack":""}

Labels (1)
0 Karma

caiosalonso
Path Finder

Hi,

This seems to be a valid json event. Did you already send this log record to Splunk? Which sourcetype settings are you using?

I guess that the default "_json" sourcetype should parse this log and extract fields correctly.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @caiosalonso,

as @abhisplunk1 said, this seems to be a json file, so you could use the _json sourcetype.

otherwise, you could add the option:

INDEXED_EXTRACTIONS = json

to your sourcetype in props.conf.

You can find more information at https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/Aboutindexedfieldextraction or https://docs.splunk.com/Documentation/Splunk/latest/Admin/Propsconf 

At least, you could try to use the spath command (https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath) in search.

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...

Explore the Latest Educational Offerings from Splunk [January 2025 Updates]

At Splunk Education, we are committed to providing a robust learning experience for all users, regardless of ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...