-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"buffer exceeded max size" when reading JSON array via auto-detect #3865
Comments
One of the approaches proposed to improve on this is for the tooling to recognize the file extension |
A user in a public Slack thread just bumped into this problem and thought of the same heuristic we did about recognizing the |
Just to chalk up another incident, the file stored at
Curiously, it doesn't have a problem reading via auto-detect with
If I attempt to leverage this partial success to load in two steps, I can get a different ZNG auto-detect error message.
But specifying explicit ZNG input works at that point, as would explicit JSON input if I'd done that initially.
|
Repro is with Zed commit 6288fa9 with the attached test data nfcapd.json.gz which consists of a JSON array of NetFlow records.
Prior to #3555 (cc: @nwt), this input data was auto-detected as JSON and the elements were treated as individual records, such that the following worked ok.
However, ever since #3555, the input's original array-ness is preserved, so now I'd need to apply
over this
to remove the array layer. This makes sense, but now auto-detect fails to get past the input phase successfully.I can make it work again if I can add the explicit
-i json
, but I'm curious if this limitation with auto-detect could be seen as a bug or undesirable limitation that could be addressed. Imagining a future of users bringing arbitrary inputs to the tooling, it does seem like being forgiving with auto-detect is a desirable goal.The wider context is that I've been drafting updates to the Custom Brimcap Config wiki article, which currently shows example command lines that depended on the previous ability to successfully auto-detect this JSON input. Due to known Brimcap limitation brimdata/brimcap#80, the option of explicitly specifying the equivalent of
-i json
on abrimcap analyze
command line is not currently available, so I can't employ the same workaround as I would forzq
. However, if the limitation identified here is deemed too difficult to address in the short term, I could revise the article to work around it for now in another way, such as perhaps using CSV input as it had in the past.The text was updated successfully, but these errors were encountered: