Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

How to configure Splunk to parse and index JSON data

$
0
0
I got a custom-crafted JSON file that holds a mix of data types within. I'm a newbie with Splunk administration so bear with me. This is the file I want to parse: `{ "data": [ { "serial": [ 0 ], "_score": null, "_type": "winevtx", "_index": "xxx", "_id": "xxx, "_source": { "process_id": 48, "message": "", "provider_guid": "xxx", "log_name": "Security", "source_name": "Microsoft-Windows-Security-Auditing", "event_data": { "TicketOptions": "xxx", "TargetUserName": "xxx", "ServiceName": "krbtgt", "IpAddress": "::ffff:", "TargetDomainName": "xxx", "IpPort": "53782", "TicketEncryptionType": "0x12", "LogonGuid": "xxx", "TransmittedServices": "-", "Status": "0x0", "ServiceSid": "xxx" }, "beat": { "name": "xxx", "version": "5.2.2", "hostname": "xxx" }, "thread_id": 1016, "@version": "1", "@metadata": { "index_local_timestamp": "2019-07-20T06:27:21.23323", "hostname": "xxxDC", "index_utc_timestamp": "2019-07-20T06:27:21.23323", "timezone": "UTC+0000" }, "opcode": "Info", "@timestamp": "2019-07-20T06:25:33.801Z", "tags": [ "beats_input_codec_plain_applied" ], "type": "wineventlog", "computer_name": "xxx", "event_id": 4769, "record_number": "198", "level": "Information", "keywords": [ "Audit Success" ], "host": "xxx", "task": "Kerberos Service Ticket Operations" } }, { "serial": [ 1 ], "_score": null, "_type": "winevtx", "_index": "xxx-xxx", "_id": "==", "_source": { "event_data": { "SubjectDomainName": "-", "LogonType": "3", "LogonGuid": "{xxx}", "SubjectUserSid": "S-1-0-0", "LogonProcessName": "Kerberos", "TargetDomainName": "xxx", "AuthenticationPackageName": "Kerberos", "ProcessName": "-", "SubjectLogonId": "0x0", "TargetUserName": "xxx", "ProcessId": "0x0", "TargetLogonId": "", "IpAddress": "::1", "LmPackageName": "-", "ImpersonationLevel": "%%1833", "IpPort": "0", "SubjectUserName": "-", "TargetUserSid": "S-1-5-18", "KeyLength": "0", "TransmittedServices": "-" }, "provider_guid": "{xxx}", "beat": { "name": "xxx", "version": "5.2.2", "hostname": "xxx" }, "@metadata": { "index_local_timestamp": "2019-07-20T06:34:21.23323", "hostname": "xxx", "index_utc_timestamp": "2019-07-20T06:34:21.23323", "timezone": "UTC+0000" }, "opcode": "Info", "@timestamp": "2019-07 -20T06:33:40.262Z", "thread_id": 52, "event_id": 4624, "record_number": "123", "level": "Information", "log_name": "Security", "source_name": "Microsoft-Windows-Security-Auditing", "@version": "1", "process_id": 48, "host": "xxx", "type": "wineventlog", "computer_name": "xxx", "version": 1, "tags": [ "beats_input_codec_plain_applied" ], "keywords": [ "Audit Success" ], "task": "Logon", "message": "" } } } This is a valid JSON, as far as I understand I need to define a new link break definition with regex to help Splunk parse and index this data correctly with all fields. Can you assist what could be a good regex definition? I tried a few and nothing worked. maybe other settings should be applied? please advise. Berry

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>