<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Breaking the logs with timestamp in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263394#M50530</link>
    <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;How to break following logs with time-stamp. Here the timestamp; "Jul 15 13:54:20"&lt;/P&gt;

&lt;P&gt;Jul 15 13:58:47 10.21.29.227 msg=Veri Jul 15 13:54:20Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomain-AD dvc= shost=1.2.3.4 dhost=abc.com duser=ADM externalId= app= reason= cs1Label="Affected User Name" cs1= cs2Label="Safe Name" cs2=XYZ cs3Label="Device Type" cs3=Operating System cs4Label="Database" cs4= cs5Label="Other info" cs5= cn1Label="Request Id" cn1= cn2Label="Ticket Id" cn2=CPM msg=CPMJul 15 13:54:21 CEF:0|Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomainAD dvc= shost=1.3.4.4 dhost=abc.com duser=AD externalId= &lt;/P&gt;</description>
    <pubDate>Sun, 17 Jul 2016 20:45:00 GMT</pubDate>
    <dc:creator>kiran331</dc:creator>
    <dc:date>2016-07-17T20:45:00Z</dc:date>
    <item>
      <title>Breaking the logs with timestamp</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263394#M50530</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;How to break following logs with time-stamp. Here the timestamp; "Jul 15 13:54:20"&lt;/P&gt;

&lt;P&gt;Jul 15 13:58:47 10.21.29.227 msg=Veri Jul 15 13:54:20Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomain-AD dvc= shost=1.2.3.4 dhost=abc.com duser=ADM externalId= app= reason= cs1Label="Affected User Name" cs1= cs2Label="Safe Name" cs2=XYZ cs3Label="Device Type" cs3=Operating System cs4Label="Database" cs4= cs5Label="Other info" cs5= cn1Label="Request Id" cn1= cn2Label="Ticket Id" cn2=CPM msg=CPMJul 15 13:54:21 CEF:0|Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomainAD dvc= shost=1.3.4.4 dhost=abc.com duser=AD externalId= &lt;/P&gt;</description>
      <pubDate>Sun, 17 Jul 2016 20:45:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263394#M50530</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-07-17T20:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking the logs with timestamp</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263395#M50531</link>
      <description>&lt;P&gt;Can you provide samples on how the events should look after splitting?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 16:17:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263395#M50531</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-07-18T16:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking the logs with timestamp</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263396#M50532</link>
      <description>&lt;P&gt;Jul 15 13:54:20Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomain-AD dvc= shost=1.2.3.4 dhost=abc.com duser=ADM externalId= app= reason= cs1Label="Affected User Name" cs1= cs2Label="Safe Name" cs2=XYZ cs3Label="Device Type" cs3=Operating System cs4Label="Database" cs4= cs5Label="Other info" cs5= cn1Label="Request Id" cn1= cn2Label="Ticket Id" cn2=CPM msg=CPM&lt;/P&gt;

&lt;P&gt;Jul 15 13:54:21 CEF:0|Cyber-Ark|Vault|9.60.0000|295|Retrieve password|5|act=Retrieve password suser=PasswordManager fname=Root\Operating System-WinDomainAD dvc= shost=1.3.4.4 dhost=abc.com duser=AD externalId=&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 21:21:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263396#M50532</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-07-18T21:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking the logs with timestamp</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263397#M50533</link>
      <description>&lt;P&gt;Your LINE_BREAKER parameter could be like this: &lt;CODE&gt;(\w{3})\s(\d{2})\s(\d{2}):(\d{2}):(\d{2})&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;See more in: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/Configureeventlinebreaking"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/Configureeventlinebreaking&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 23:45:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Breaking-the-logs-with-timestamp/m-p/263397#M50533</guid>
      <dc:creator>rafamss</dc:creator>
      <dc:date>2016-07-18T23:45:27Z</dc:date>
    </item>
  </channel>
</rss>

