<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What configuration is required to index a single log with one event only, transforms.conf or props.conf? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340971#M62861</link>
    <description>&lt;P&gt;Hi, &lt;BR /&gt;
My query is that Splunk indexer is indexing a single log with two separate events whereas it should be one event only.&lt;BR /&gt;
The issue is that I am receiving two timestamps in a single log and I need Splunk to index it as a single event only.&lt;/P&gt;

&lt;P&gt;Full Event Expected:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[2018-01-31T15:23:25.470+04:00]...abc.....def...........ghi...........
......................................................................
......................................................................
  &amp;lt;ABC xmlns="http://tempuri.org/"&amp;gt;
    &amp;lt;A&amp;gt;
      &amp;lt;ID&amp;gt;1234567&amp;lt;/ID&amp;gt;
      &amp;lt;tickets&amp;gt;
        &amp;lt;DEF&amp;gt;
          &amp;lt;ticketNumber&amp;gt;12345&amp;lt;/ticketNumber&amp;gt;
          &amp;lt;paidAmount&amp;gt;100&amp;lt;/paidAmount&amp;gt;
          &amp;lt;paymentDateTime&amp;gt;2015-02-10T15:25:19Z&amp;lt;/paymentDateTime&amp;gt;
          &amp;lt;receiptNumber&amp;gt;987654321&amp;lt;/receiptNumber&amp;gt;
        &amp;lt;/DEF&amp;gt;
      &amp;lt;/tickets&amp;gt;
    &amp;lt;/A&amp;gt;
  &amp;lt;/ABC&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Received Event 1:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[2018-01-31T15:23:25.470+04:00]...abc.....def...........ghi...........
......................................................................
......................................................................
  &amp;lt;ABC xmlns="http://tempuri.org/"&amp;gt;
    &amp;lt;A&amp;gt;
      &amp;lt;ID&amp;gt;1234567&amp;lt;/ID&amp;gt;
      &amp;lt;tickets&amp;gt;
        &amp;lt;DEF&amp;gt;
          &amp;lt;ticketNumber&amp;gt;12345&amp;lt;/ticketNumber&amp;gt;
          &amp;lt;paidAmount&amp;gt;100&amp;lt;/paidAmount&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Received Event 2:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;      &amp;lt;paymentDateTime&amp;gt;2015-02-10T15:25:19Z&amp;lt;/paymentDateTime&amp;gt;
      &amp;lt;receiptNumber&amp;gt;987654321&amp;lt;/receiptNumber&amp;gt;
    &amp;lt;/DEF&amp;gt;
  &amp;lt;/tickets&amp;gt;
&amp;lt;/A&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Could anyone please suggest me how to proceed with this and what parameters to use for configuring props.conf or ?transforms.conf(if required)?&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2018 12:22:54 GMT</pubDate>
    <dc:creator>AdsicSplunk</dc:creator>
    <dc:date>2018-01-31T12:22:54Z</dc:date>
    <item>
      <title>What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340971#M62861</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;
My query is that Splunk indexer is indexing a single log with two separate events whereas it should be one event only.&lt;BR /&gt;
The issue is that I am receiving two timestamps in a single log and I need Splunk to index it as a single event only.&lt;/P&gt;

&lt;P&gt;Full Event Expected:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[2018-01-31T15:23:25.470+04:00]...abc.....def...........ghi...........
......................................................................
......................................................................
  &amp;lt;ABC xmlns="http://tempuri.org/"&amp;gt;
    &amp;lt;A&amp;gt;
      &amp;lt;ID&amp;gt;1234567&amp;lt;/ID&amp;gt;
      &amp;lt;tickets&amp;gt;
        &amp;lt;DEF&amp;gt;
          &amp;lt;ticketNumber&amp;gt;12345&amp;lt;/ticketNumber&amp;gt;
          &amp;lt;paidAmount&amp;gt;100&amp;lt;/paidAmount&amp;gt;
          &amp;lt;paymentDateTime&amp;gt;2015-02-10T15:25:19Z&amp;lt;/paymentDateTime&amp;gt;
          &amp;lt;receiptNumber&amp;gt;987654321&amp;lt;/receiptNumber&amp;gt;
        &amp;lt;/DEF&amp;gt;
      &amp;lt;/tickets&amp;gt;
    &amp;lt;/A&amp;gt;
  &amp;lt;/ABC&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Received Event 1:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[2018-01-31T15:23:25.470+04:00]...abc.....def...........ghi...........
......................................................................
......................................................................
  &amp;lt;ABC xmlns="http://tempuri.org/"&amp;gt;
    &amp;lt;A&amp;gt;
      &amp;lt;ID&amp;gt;1234567&amp;lt;/ID&amp;gt;
      &amp;lt;tickets&amp;gt;
        &amp;lt;DEF&amp;gt;
          &amp;lt;ticketNumber&amp;gt;12345&amp;lt;/ticketNumber&amp;gt;
          &amp;lt;paidAmount&amp;gt;100&amp;lt;/paidAmount&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Received Event 2:-&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;      &amp;lt;paymentDateTime&amp;gt;2015-02-10T15:25:19Z&amp;lt;/paymentDateTime&amp;gt;
      &amp;lt;receiptNumber&amp;gt;987654321&amp;lt;/receiptNumber&amp;gt;
    &amp;lt;/DEF&amp;gt;
  &amp;lt;/tickets&amp;gt;
&amp;lt;/A&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Could anyone please suggest me how to proceed with this and what parameters to use for configuring props.conf or ?transforms.conf(if required)?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 12:22:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340971#M62861</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-01-31T12:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340972#M62862</link>
      <description>&lt;P&gt;Hi @AdsicSplunk,&lt;/P&gt;

&lt;P&gt;Please try below configuration in props.conf on Indexer/Heavy Forwarder whichever comes first.&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[yoursourcetype]
TIME_PREFIX = ^\[
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%3N%:z
MAX_TIMESTAMP_LOOKAHEAD = 29
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Restart splunk on Indexer/Heavy Forwarder.&lt;/P&gt;

&lt;P&gt;I hope this helps.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Harshil&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 12:39:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340972#M62862</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-01-31T12:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340973#M62863</link>
      <description>&lt;P&gt;hello there:&lt;/P&gt;

&lt;P&gt;in inputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor://path.to.file]
index = index
sourcetype = your_sourcetype
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in props.conf on indexer or heavy forwarder:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [your_sourcetype]
SHOULD_LINEMERGE=true
NO_BINARY_CHECK=true
TIME_FORMAT=%Y-%m%dT%H:%M%s.%3N:%z
TIME_PREFIX=[
MAX_TIMESTAMP_LOOKAHEAD=30
BREAK_ONLY_BEFORE=\
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;further reading regarding where to place files and which configurations goes in each file here:&lt;BR /&gt;
&lt;A href="https://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings%3F"&gt;https://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings%3F&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;hope it helps&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 12:46:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340973#M62863</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2018-01-31T12:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340974#M62864</link>
      <description>&lt;P&gt;Hi Harsmarvania,&lt;/P&gt;

&lt;P&gt;Thank you for your support!!&lt;/P&gt;

&lt;P&gt;I tried this config in props.conf but it got worse for me. Now, my indexer is creating even more events breaking each line and putting each line in a separate event. My question is that my event should not break into 2 events but should create one event only ignoring the second timestamp coming inside the event. Please read my questions, if you need some clarifications on this. please feel free to ask me questions.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 05:37:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340974#M62864</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-02-01T05:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340975#M62865</link>
      <description>&lt;P&gt;Hi @AdsicSplunk,&lt;/P&gt;

&lt;P&gt;I tried with below configuration in splunk&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[mysourcetype]
SHOULD_LINEMERGE=true
NO_BINARY_CHECK=true
TIME_FORMAT=%Y-%m-%dT%H:%M:%S.%3N%:z
TIME_PREFIX=^\[
MAX_TIMESTAMP_LOOKAHEAD=29
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And it is working perfectly fine.&lt;/P&gt;

&lt;P&gt;Please refer screenshot &lt;A href="https://imgur.com/a/BnQJ9"&gt;https://imgur.com/a/BnQJ9&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;If this does not work for you, can you please let us know whether do you have any whitespace before &lt;CODE&gt;[2018-01-31T15:23:25.470+04:00]&lt;/CODE&gt; ?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 05:58:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340975#M62865</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-02-01T05:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340976#M62866</link>
      <description>&lt;P&gt;Hi Adonio,&lt;/P&gt;

&lt;P&gt;Thank you for your support!!&lt;BR /&gt;
i tried this config but now the events are created not based on [2018-01-31T15:23:25.470+04:00] which was being picked without props.conf config. Now, this config has scattered the events and displaying  the results which are not at all good. My requirement is to create events based on [2018-01-31T15:23:25.470+04:00] not based on 2015-02-10T15:25:19Z. Please provide your inputs.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 06:00:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340976#M62866</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-02-01T06:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340977#M62867</link>
      <description>&lt;P&gt;Hi @harsmarvania57,&lt;/P&gt;

&lt;P&gt;This is the same config that Adonio provided.&lt;BR /&gt;
I tried this config but now the events are created not based on [2018-01-31T15:23:25.470+04:00] which was being picked without props.conf config earlier. Now, this config has scattered the events and displaying the results which are not at all good. My requirement is to create events based on [2018-01-31T15:23:25.470+04:00] not based on 2015-02-10T15:25:19Z. Please provide your inputs.&lt;/P&gt;

&lt;P&gt;Note:- There is no space in the timestamp. The data begins with "[" only.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 06:15:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340977#M62867</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-02-01T06:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340978#M62868</link>
      <description>&lt;P&gt;The screenshot is not accessible. Could you please share again?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 06:15:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340978#M62868</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-02-01T06:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340979#M62869</link>
      <description>&lt;P&gt;If you look at &lt;CODE&gt;TIME_FORMAT&lt;/CODE&gt; parameter closely in config which is provided by @adonio and config which I have provided then there are difference . You can see screenshot here as well &lt;A href="https://prnt.sc/i8i709"&gt;https://prnt.sc/i8i709&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 06:31:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340979#M62869</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2018-02-01T06:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: What configuration is required to index a single log with one event only, transforms.conf or props.conf?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340980#M62870</link>
      <description>&lt;P&gt;I tried with both configs, still I am not getting what is required. Anyway, Thank you for your support, I will try again to get to the desired requirement. &lt;/P&gt;

&lt;P&gt;Really appreciate your support.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 06:59:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-configuration-is-required-to-index-a-single-log-with-one/m-p/340980#M62870</guid>
      <dc:creator>AdsicSplunk</dc:creator>
      <dc:date>2018-02-01T06:59:01Z</dc:date>
    </item>
  </channel>
</rss>

