I have json being input to Splunk and the JSON is being parsed ok. At least the events show up with collapsed fields in the list of events. But none of the JSON fields are showing up as "interesting fileds" which makes me wonder if the JSON is being properly parsed. From the documentation I read that if I set:
KV_MODE = json
that it's "Used for search-time field extractions only" and "automatically extracts fields from JSON data" which leads me to expect that the JSON fields would show up in "interesting fields".
However that's not the case. Here's my props.conf file
INDEXED_EXTRACTIONS = JSON
KV_MODE = json
JSON_TRIM_BRACES_IN_ARRAY_NAMES = TRUE
TRUNCATE = 0
Thanks, I was starting to think that was the principle reason behind this.
The "Interesting Fields" section displays fields that appear in >20% of the search results for a given search. Here's more info about that:
https://docs.splunk.com/Documentation/Splunk/7.0.2/SearchTutorial/Usefieldstosearch
You can manually add specific fields to the "Selected Fields" section if you'd like.