I am just looking at a new data input in Splunk. In some cases I am seeing one timestamp per event which is what I would expect to see but in some cases, Splunk is placing all of the following under one event:
e.g. of one event in Splunk which has multiple timestamps:
2012-07-02 15:43:33.319, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
2012-07-02 15:43:33.531, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
2012-07-02 15:43:33.744, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
Ideally, Splunk should be showing this as three separate events and not one event where _time is 2012-07-02 15:43:33.319. How can this event to be chopped into three events with the three timestamps? How would this be done in props.conf? Thanks in advance for your help
I would try this in props.conf. See link below, the stanza can reference your sourcetype, host or source etc.
SHOULDLINEMERGE = true
BREAKONLYBEFOREDATE = true
You can see the other props.conf settings here: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf