TA Zeek JSON Parsing is a lightweight Splunk Technology Add-on for Zeek logs in newline-delimited JSON format. It solves a common ingestion problem where multiple JSON events can be treated as grouped text unless proper event breaking is applied before JSON field extraction. This add-on defines a dedicated `zeek_json` sourcetype with line-breaking and JSON parsing settings so Splunk can split each JSON object into its own event and extract fields correctly. It is intended for deployment on the parsing tier, such as a heavy forwarder or indexer, where event breaking occurs.
Categories
Security, Fraud & Compliance, SIEM
Resources
Log in to report this app listing