Splunk Search

parsing json and sending as search command

CorpusCallosum
Explorer

Hi Guys

I have a json with 75 elements. Normally i can put them in macro and run in search but that means 75 macro search which is not efficient.

I would like to parse json data rule, description, tags and impact values from json file and use those as search

Sample JSON is below

{
 "filters":{
  "filter":[
   {
    "id":"1",
    "rule":"(?:\"[^\"]*[^-]?>)|(?:[^\\w\\s]\\s*\\\/>)|(?:>\")",
    "description":"Finds html breaking injections including whitespace attacks",
    "tags":{
      "tag":[
        "xss",
        "csrf"
      ]
    },
    "impact":"4"
  },

What would be the efficient way to use thos element in search?

Thanks in advance

Tags (2)
1 Solution

dshpritz
SplunkTrust
SplunkTrust

There are two things you might want to look into. If the whole event is JSON, then you should look into the KV_MODE = json configuration in props.conf:

http://docs.splunk.com/Documentation/Splunk/6.1.2/Admin/Propsconf

If this is the value of a field, then you can look into the spath command:

http://docs.splunk.com/Documentation/Splunk/6.1.2/SearchReference/Spath

View solution in original post

dshpritz
SplunkTrust
SplunkTrust

There are two things you might want to look into. If the whole event is JSON, then you should look into the KV_MODE = json configuration in props.conf:

http://docs.splunk.com/Documentation/Splunk/6.1.2/Admin/Propsconf

If this is the value of a field, then you can look into the spath command:

http://docs.splunk.com/Documentation/Splunk/6.1.2/SearchReference/Spath

CorpusCallosum
Explorer

this JSON file is actually kind of search db for me. not the list of events. My logs are in syslog format. i just want to parse this json and search in the logs.

0 Karma

CorpusCallosum
Explorer

macro i manually copy paste the regex and description. nothing special 🙂

0 Karma

somesoni2
Revered Legend

can you share how you're parsing them in macro?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...