Quantcast
Channel: Questions in topic: "props.conf"
Viewing all articles
Browse latest Browse all 1485

KV_MODE=json sometimes skips a particular JSON field?

$
0
0
We have a log file with multiple lines of JSON similar to this: { "foo": "bar","foo1":"foo2","userEmail":"foo@bar.com"} { "foo": "bar","foo1":"foo2","userEmail":"foo1@bar.com"} { "foo": "bar","foo1":"foo2","userEmail":"foo2@bar.com"} And search-time extraction works fine for almost all of the fields... except one! Oddly, around 7-8% of all logs do not have userEmail automatically extracted as checked in the Event Coverage, even when I've manually defined it in props.conf. This was verified with the queries: index=foo | search userEmail=* index=foo | search NOT userEmail=* Events are sent from a forwarder with this props.conf: [foo] NO_BINARY_CHECK = true SHOULD_LINEMERGE = false TIME_FORMAT = %Y%m%d%H%M%S%3N TIME_PREFIX = \"timestamp\":\" TZ = UTC KV_MODE = json disabled = false TRUNCATE = 0 I added these on the search head earlier today to force search-time extraction for userEmail, but didn't work, even when I verified the regex catches all emails in Splunk Web: [foo] EXTRACT-userEmail = "userEmail":"(?P[^"]+) KV_MODE = json Any idea why this might happen?

Viewing all articles
Browse latest Browse all 1485

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>