Hello Team, we are trying to parse fields from json log format, but there are nested fields Within the "Message".
we user the json filter and other different steps.
All the fields inside the "Message" are not being parsed, Please chek the sample log for reference. {"EventReceivedTime": "202*-0*-** 21:44:45","SourceModuleName": "in_json_log","SourceModuleType": "im_file","Message": ",{\\"_id\\":\\"66**c7d23afb**6e6*0f2\\",\\"serialNum\\":0,\\"acknowledged\\":***,\\"time\\":\\"202*-0*-**T14:14:04.657Z\\",\\"hostname\\":\\"e-d**-g**l-cluster-normal--7-mm.q-gcp-00-d-g-24-02.181862379",\\"fqdn\\":\\"\\",\\"containerName\\":\\"bu\\",\\"containerID\\":\\"2a91f881c8075c4f34db5*****3d6e\\",\\"imageName\\":\\"d***.io/google/cloud-:l\\", please suggest a way to parse the fields insite Message.
Best answer by bsalvatore
Hi,
This is the real message received in the SIEM (escaped character, comma character before { , etc.)? Because if the original message like the following:
This is the real message received in the SIEM (escaped character, comma character before { , etc.)? Because if the original message like the following:
and the parser automatically create the id, serialNum, hostname, etc. variable.
A
Anonymous
May 21, 2024
Hi,
This is the real message received in the SIEM (escaped character, comma character before { , etc.)? Because if the original message like the following: