Monitoring Splunk

How do you parse the following JSON data?

ips_mandar
Builder

Hi,

I want to parse below json data .Below is one sample event-
Objabco.codecnullavro.schema�{"type":"record","name":"Eventtable","namespace":"abc.cdf.ghi","fields":[{"name":"SequenceNumber","type":"long"},{"name":"Offset","type":"string"},{"name":"EnqueuedTimeUtc","type":"string"},{"name":"SystemProperties","type":{"type":"map","values":["long","double","string","bytes"]}},{"name":"Properties","type":{"type":"map","values":["long","double","string","bytes","null"]}},{"name":"Body","type":["null","bytes"]}]}O����D���=XTPO����D���=XTP

I tried spath but unable to get success. Can anyone help me to parse this json data

Tags (1)
0 Karma
1 Solution

whrg
Motivator

Hello @ips_mandar,

Your sample event does not consist of strict JSON data because of the non-JSON prefix and suffix.

I suggest you extract the JSON data as a new field and then run spath on this field:

yourbasesearch
| rex field=_raw "(?<json_data>\{.+\})"
| spath input=json_data

The regex above is defined very broadly. Your sample event is full of strange symbols. So you might want to improve the regular expression.

Ideally, you would index pure JSON data in Splunk and set the sourcetype to json. This way, the JSON data gets parsed automatically.

View solution in original post

0 Karma

whrg
Motivator

Hello @ips_mandar,

Your sample event does not consist of strict JSON data because of the non-JSON prefix and suffix.

I suggest you extract the JSON data as a new field and then run spath on this field:

yourbasesearch
| rex field=_raw "(?<json_data>\{.+\})"
| spath input=json_data

The regex above is defined very broadly. Your sample event is full of strange symbols. So you might want to improve the regular expression.

Ideally, you would index pure JSON data in Splunk and set the sourcetype to json. This way, the JSON data gets parsed automatically.

0 Karma

ips_mandar
Builder

thanks @whrg
it is working at search time..
also to work at indextime if I remove all strange symbols before and after json data then simple spath command also might work.
Can you please help me to remove all strange symbols before indexing so it can parse the json data at indextime

0 Karma

whrg
Motivator

Perhaps you could modify the script which produces the log files. Modify the script that it only produces pure JSON without these headers and footers.

If that's not feasible, check out this thread: Remove first part of string before creating a JSON source type.

So I would suggest you put something like this in your props.conf:

[source::/your/logfile]
SEDCMD-remove_header = s/^.*?\{/{/1
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...