<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Issues with event parsing using prop configuration file in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Issues-with-event-parsing-using-prop-configuration-file/m-p/678910#M232107</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have some issues with parsing events and a few sample events are given below:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:10:15", "statusCode":"active"}&lt;STRONG&gt;&amp;nbsp;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:09:11", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm02", "accessKey":"26dsaa", "time":"2023-12-03T09:09:08", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{\"eventVer\":\"&lt;/STRONG&gt;2.56", "userId":"B001", "accountId":"Test04", "accessKey":"21fsda", "time":"2023-12-03T09:09:04", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{\"eventVer\":\"&lt;/STRONG&gt;2.56", "userId":"B009", "accountId":"Adm01", "accessKey":"21assaa", "time":"2023-12-03T09:09:01", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"B023", "accountId":"Adm01", "accessKey":"30tsaa", "time":"2023-12-03T09:08:55", "statusCode":"active"}&lt;STRONG&gt;&amp;nbsp;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A025", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:08:51", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"C015", "accountId":"Dev01", "accessKey":"41scab", "time":"2023-12-03T09:08:48", "statusCode":"active"}&lt;/P&gt;&lt;P&gt;The event breaking point is marked as &lt;STRONG&gt;Bold &lt;/STRONG&gt;and I used&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;LINE_BREAKER=([\r\n]*)\{"eventVer":"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;in my prop.conf file, but not parsing all events as expected. Any recommendations will be highly appreciated. Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2024 01:58:25 GMT</pubDate>
    <dc:creator>SplunkDash</dc:creator>
    <dc:date>2024-02-28T01:58:25Z</dc:date>
    <item>
      <title>Issues with event parsing using prop configuration file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Issues-with-event-parsing-using-prop-configuration-file/m-p/678910#M232107</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have some issues with parsing events and a few sample events are given below:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:10:15", "statusCode":"active"}&lt;STRONG&gt;&amp;nbsp;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:09:11", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A021", "accountId":"Adm02", "accessKey":"26dsaa", "time":"2023-12-03T09:09:08", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{\"eventVer\":\"&lt;/STRONG&gt;2.56", "userId":"B001", "accountId":"Test04", "accessKey":"21fsda", "time":"2023-12-03T09:09:04", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{\"eventVer\":\"&lt;/STRONG&gt;2.56", "userId":"B009", "accountId":"Adm01", "accessKey":"21assaa", "time":"2023-12-03T09:09:01", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"B023", "accountId":"Adm01", "accessKey":"30tsaa", "time":"2023-12-03T09:08:55", "statusCode":"active"}&lt;STRONG&gt;&amp;nbsp;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"A025", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:08:51", "statusCode":"active"}&amp;nbsp;&lt;STRONG&gt;{"eventVer":"&lt;/STRONG&gt;2.56", "userId":"C015", "accountId":"Dev01", "accessKey":"41scab", "time":"2023-12-03T09:08:48", "statusCode":"active"}&lt;/P&gt;&lt;P&gt;The event breaking point is marked as &lt;STRONG&gt;Bold &lt;/STRONG&gt;and I used&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;LINE_BREAKER=([\r\n]*)\{"eventVer":"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;in my prop.conf file, but not parsing all events as expected. Any recommendations will be highly appreciated. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 01:58:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Issues-with-event-parsing-using-prop-configuration-file/m-p/678910#M232107</guid>
      <dc:creator>SplunkDash</dc:creator>
      <dc:date>2024-02-28T01:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with event parsing using prop configuration file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Issues-with-event-parsing-using-prop-configuration-file/m-p/678911#M232108</link>
      <description>&lt;P&gt;Looks like you don't have nested json events in there, so have you tried to just regex by the } and { characters?&lt;BR /&gt;&lt;BR /&gt;Try this:&lt;BR /&gt;&lt;SPAN&gt;[your_sourcetype]&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;SHOULD_LINEMERGE = false&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;LINE_BREAKER = \}\s+\{&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 02:40:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Issues-with-event-parsing-using-prop-configuration-file/m-p/678911#M232108</guid>
      <dc:creator>victor_menezes</dc:creator>
      <dc:date>2024-02-28T02:40:29Z</dc:date>
    </item>
  </channel>
</rss>

