Splunk Search

Suitable Sourcetype for uploading a file in json format

dinaabdelhakam
Path Finder

Hello, I am parsing a file in JSON format to splunk entrprise but the sourcetype is not selected automatically, when I chose JSON sourcetype manually the events doesn't parsed correctly, In addition to I put the file in a JSON validator and the result was that the JSON format is valid so what is the problem then ?

Tags (1)
0 Karma

harsmarvania57
Ultra Champion

Hi,

Can you please let us know how are you ingesting file into Splunk? If Universal Forwarder is sending JSON logfile to Splunk Indexer then try to put below configuration on Universal Forwarder and restart splunk on UF.

props.conf

[yoursourcetype]
INDEXED_EXTRACTIONS = JSON
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...