<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to combine messages in a log file that match an ID into a single event ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-messages-in-a-log-file-that-match-an-ID-into-a/m-p/477247#M192670</link>
    <description>&lt;P&gt;There aren't any settings that will merge events at index time based on a field.&lt;BR /&gt;
Consider writing a scripted input that reads the file and does the required processing before writing the results to stdout for indexing.  You'll need a heavy forwarder to run the script.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2020 15:34:26 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-01-09T15:34:26Z</dc:date>
    <item>
      <title>How to combine messages in a log file that match an ID into a single event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-messages-in-a-log-file-that-match-an-ID-into-a/m-p/477246#M192669</link>
      <description>&lt;P&gt;I am currently testing forwarding logs from a file I am monitoring, but the software that generates those logs creates a line per type event related to a process, while keeping an ID of the process that generated all the individual messages. Is there a way to combine/merge all messages with the same ID into an event when they reach the indexer (the IDs are unique, even when the process runs multiple times, it generates a new ID for every occurrence)? I'm looking for a solution that does not involve setting up a search that will generate the same result, I want all the messages stored as one event that then can be searched for more details.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 15:15:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-messages-in-a-log-file-that-match-an-ID-into-a/m-p/477246#M192669</guid>
      <dc:creator>ricotries</dc:creator>
      <dc:date>2020-01-09T15:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine messages in a log file that match an ID into a single event ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-messages-in-a-log-file-that-match-an-ID-into-a/m-p/477247#M192670</link>
      <description>&lt;P&gt;There aren't any settings that will merge events at index time based on a field.&lt;BR /&gt;
Consider writing a scripted input that reads the file and does the required processing before writing the results to stdout for indexing.  You'll need a heavy forwarder to run the script.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 15:34:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-messages-in-a-log-file-that-match-an-ID-into-a/m-p/477247#M192670</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-01-09T15:34:26Z</dc:date>
    </item>
  </channel>
</rss>

