Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Under review
Created by Guest
Created on Jul 10, 2025

CDP sending data to splunk reducing complexity

Problem: 
CDP sends our JSON log lines as part of a message field/value to Splunk. In this process the Json gets stringified \”key\”: \”value\”. 
Splunk cannot extract this string by default like it does when sending the logs via the by Splunk recommended/default way. 

So, we as a consumer cannot really use the logs that CDP sends to Splunk without a lot of work on Splunk side like custom field extraction, config changes, …  
Also, a lot of companies have centralized Splunk teams, where the app teams only have limited configuration options in their Splunk.

Source log format
{“logKey1”:”logValue1”, …}

As-Is Logs/Events in Splunk via CDP
Message=”{\“logKey1\”:\”logValue1\”, …}”


Expected format in Splunk

{“logKey1”:”logValue1”, …}

Possible Solution:
For Json logs and possibly all logs send the log lines as part of an event field like recommended. Do not stringify them.

Example with curl: curl "scribe.uat” -d '{"event": {"logKey1": "logValue1", …}}' 
Example explicit for JSON : curl "scribe.uat” -d '{"sourcetype": "_json", "event": {"loglevel": "INFO", "example": "value": }}' 
https://help.splunk.com/en/data-management/collect-http-event-data/use-hec-in-splunk-enterprise/http-event-collector-examples#:~:text=%27%7B%22acks%22%3A%20%5B1%2C3%2C4%5D%7D%27-,Example%208%3A%20Extract%20JSON%20fields,-This%20example%20demonstrates


As probably many consumers already receive their mainframe logs via CDP in the old format via message it would be a good idea to add an additional field to CDP like “Splunk HEC for JSON logs”. 

Another less important, but nevertheless open point is whether to send the metadata also as JSON or like currently (host=mainframe). 
Maybe this could be made configurable so that the consumer can choose this on CDP side. 


 

Idea priority Medium