<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event parsing issues in Installation</title>
    <link>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459039#M8455</link>
    <description>&lt;P&gt;@sathishkompelly , in your original post you had different timestamps:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    7/10/19

10:27:22.000 AM
que identifier that can be used to xxxxxx-some text -xxxxx-xxxxxx - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

7/10/19
9:40:34.000 AM
identifier that can be xxxxxx-some text -xxxxx-xxxxxxx.

7/10/19
9:31:21.000 AM
ogged on. xxxx some text xxxxxxx This will be 0 if no session key was requested.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In this reply, you are giving a different timestamp:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;7/10/19
2:35:11.000 PM
Jul 10 12:34:56 xxxxxx-some text -xxxxx-xxxxxx - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Jul 10 12:35:00 xxxxxx-some text -xxxxx-xxxxxxx.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If the timestamp format changes, then this won't work.  If it remains the same, as you originally posted, it should work&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2019 19:58:42 GMT</pubDate>
    <dc:creator>ragedsparrow</dc:creator>
    <dc:date>2019-07-10T19:58:42Z</dc:date>
    <item>
      <title>Event parsing issues</title>
      <link>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459036#M8452</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;
We are seeing very often event parsing issues when monitoring a file, we added the below settings but still it is not breaking at the right point, it is breaking at uneven points like below samples. We are trying to parse the winevent logs. Please help me to get this parsed at the date point.&lt;/P&gt;

&lt;P&gt;props.conf:- &lt;BR /&gt;
[host::host01]&lt;BR /&gt;
SHOULD_LINEMERGE = true&lt;BR /&gt;
BREAK_ONLY_BEFORE_DATE = true&lt;BR /&gt;
TRUNCATE = 10000&lt;/P&gt;

&lt;P&gt;Sample Logs:- &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;7/10/19
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;10:27:22.000 AM &lt;BR /&gt;
que identifier that can be used to xxxxxx-some text -xxxxx-xxxxxx  - Key length indicates the length of the generated session key. This will be 0 if no session key was requested. &lt;/P&gt;

&lt;P&gt;7/10/19&lt;BR /&gt;
9:40:34.000 AM&lt;BR /&gt;&lt;BR /&gt;
identifier that can be xxxxxx-some text -xxxxx-xxxxxxx. &lt;/P&gt;

&lt;P&gt;7/10/19&lt;BR /&gt;
9:31:21.000 AM&lt;BR /&gt;&lt;BR /&gt;
ogged on.  xxxx some text xxxxxxx This will be 0 if no session key was requested.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:12:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459036#M8452</guid>
      <dc:creator>sathishkompelly</dc:creator>
      <dc:date>2020-09-30T01:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Event parsing issues</title>
      <link>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459037#M8453</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;

&lt;P&gt;So, in a props.conf, there are 6 base settings that should be defined (also known as the "magic six").  They are as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SHOULD_LINEMERGE=
LINE_BREAKER=
MAX_TIMESTAMP_LOOKAHEAD=
TIME_PREFIX=
TRUNCATE=
TIME_FORMAT=
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is a good resource: &lt;A href="https://www.hurricanelabs.com/splunk-tutorials/splunk-baseline-props-part-1-building-a-smart-foundation"&gt;https://www.hurricanelabs.com/splunk-tutorials/splunk-baseline-props-part-1-building-a-smart-foundation&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;For what you've posted as your sample data, I would do something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[host::host01]
SHOULD_LINEMERGE=true
LINE_BREAKER=([\r\n]+)(?=\d+\/)
NO_BINARY_CHECK=true
TIME_FORMAT=%D%n%T.%3N%n%p
TIME_PREFIX=^
MAX_TIMESTAMP_LOOKAHEAD=26
TRUNCATE=1000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 10 Jul 2019 18:35:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459037#M8453</guid>
      <dc:creator>ragedsparrow</dc:creator>
      <dc:date>2019-07-10T18:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Event parsing issues</title>
      <link>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459038#M8454</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/102823"&gt;@ragedsparrow&lt;/a&gt; Thanks for the reply, when I added the settings it is taking multiple lines to a single event,&lt;/P&gt;

&lt;P&gt;7/10/19&lt;BR /&gt;
2:35:11.000 PM&lt;BR /&gt;&lt;BR /&gt;
Jul 10 12:34:56  xxxxxx-some text -xxxxx-xxxxxx - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;BR /&gt;
Jul 10 12:35:00  xxxxxx-some text -xxxxx-xxxxxxx.&lt;/P&gt;

&lt;P&gt;SHOULD_LINEMERGE = true&lt;BR /&gt;
LINE_BREAKER = ([\r\n]+)(?=\d+\/)&lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
TIME_FORMAT = %D%n%T.%3N%n%p&lt;BR /&gt;
TIME_PREFIX = ^&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD = 7&lt;BR /&gt;
TRUNCATE = 1000&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:12:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459038#M8454</guid>
      <dc:creator>sathishkompelly</dc:creator>
      <dc:date>2020-09-30T01:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: Event parsing issues</title>
      <link>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459039#M8455</link>
      <description>&lt;P&gt;@sathishkompelly , in your original post you had different timestamps:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    7/10/19

10:27:22.000 AM
que identifier that can be used to xxxxxx-some text -xxxxx-xxxxxx - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

7/10/19
9:40:34.000 AM
identifier that can be xxxxxx-some text -xxxxx-xxxxxxx.

7/10/19
9:31:21.000 AM
ogged on. xxxx some text xxxxxxx This will be 0 if no session key was requested.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In this reply, you are giving a different timestamp:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;7/10/19
2:35:11.000 PM
Jul 10 12:34:56 xxxxxx-some text -xxxxx-xxxxxx - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Jul 10 12:35:00 xxxxxx-some text -xxxxx-xxxxxxx.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If the timestamp format changes, then this won't work.  If it remains the same, as you originally posted, it should work&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 19:58:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Event-parsing-issues/m-p/459039#M8455</guid>
      <dc:creator>ragedsparrow</dc:creator>
      <dc:date>2019-07-10T19:58:42Z</dc:date>
    </item>
  </channel>
</rss>

