Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

How to make Index time field extraction work for key at end of large json events

$
0
0
We are trying to do index time field extraction on the 'job' field from our json log events. We notice that if the "job":"123" field appears early in the json this works fine and we can do searches like this successfully: ... job::* ... job::123 However if the job field occurs after the 4096'th (or so) character in the event, the above searches will fail. In fact this doesn't even find the event: ... job=123 Our json events are on one line. Is there a config that will extend Splunk's search for the job field? Any suggestions? Our configs are like this: fields.conf [job] INDEXED=true transforms.conf [my_job] REGEX = \"job\":\"(?[^\"]+)\" FORMAT = job::$1 WRITE_META = true props.conf [my_json] KV_MODE = json NO_BINARY_CHECK = true SHOULD_LINEMERGE = false TIME_PREFIX = \"time\":\" TRANSFORMS-job = my_job disabled = false

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>