Splunk Enterprise

How to write props for JSON logs?

Vani_26
Path Finder

Below is the sample log:


{[-]
    context: default

     level: INFO

     logger: logginfdata.pre-request.util

    mdc: { [+]

 }

message:  this is a json request

[evenId=76546787678888899999]]

thread: RealtimeExecutor-1999

timestamp: 2022-03-23 15:44:41.965

}

may i know how can write props for this kind of logs.

Labels (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@Vani_26 

Can you please share a valid JSON sample event? Just copy _raw and mask data with sample values. Now paste it into the code block.  Find this (</>) tool in the toolbar for the code block popup. This will help us to answer you with a proper solution.

KV

 

Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...