hi all,
I am trying to extract field from Splunk "extract more fields" feature, its not showing as the logs in events section, which is in json format.
below is the sample log from which I need to extract or regex from field "id"="+779988663344" and "id" = 333222268888 numbers.
"Session-IngresslId": "999999999-9999999-999999999@SSS.com", "EgressId": "999999999-9999999-999999999@b.com", "Accc-ll-Id": "", "Generic-Id": "", "Id": "+779988663344\" ;tag=7777777777-4444444444\"", "Id": "333222268888\" \""
all events are in json format but when we are using field extractor I see all above kind of raw events.
thanks for helping
For JSON type logs it is better to tell the source that is collecting logs that field extractions are of type JSON. On the source machine (or wherever you are ingesting logs from under props.conf
add this stanza:
[your:sourcetype]
TRUNCATE = 0
NO_BINARY_CHECK = true
SHOULD_LINEMERGE = false
KV_MODE = JSON
Splunk will automatically extract all the fields for you and show you nicely highlighted in the _raw as well.
For JSON type logs it is better to tell the source that is collecting logs that field extractions are of type JSON. On the source machine (or wherever you are ingesting logs from under props.conf
add this stanza:
[your:sourcetype]
TRUNCATE = 0
NO_BINARY_CHECK = true
SHOULD_LINEMERGE = false
KV_MODE = JSON
Splunk will automatically extract all the fields for you and show you nicely highlighted in the _raw as well.
thanks but got working using regex.