Getting Data In

How to configure Splunk to break my sample log data into separate events, not one combined event?

dbcase
Motivator

Hi,

I have the below log data:

16:37:56.875 [[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG splunk - {'externalRefId':'exr654321','message':'input: {"wifiNetwork":{"ssidName":"YOCTO_2.1S9","securityPassphrase":"xxxxxxx"}}'}
16:37:56.883 [[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG splunk - {'externalRefId':'exr654321','message':'Calling https://csp-stg.codebig2.net/selfhelp/account/exr654321/services/home/wifiNetwork'}
16:37:57.296 [[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG splunk - {'externalRefId':'exr654321','message':'RMA service return 202','serverResponseTimeMs':'413'}

and whenever it is imported into Splunk using the Universal Forwarder, it treats it as one event (see image)

alt text

How can I get Splunk to separate each line?

0 Karma
1 Solution

sundareshr
Legend

Try adding this to your props.conf on the indexer and restart splunk

[sourcetype_stanza_name]
SHOULD_LINEMERGE=true
TIME_FORMAT=%H:%M:%S.%3N

View solution in original post

0 Karma

s2_splunk
Splunk Employee
Splunk Employee

It looks like you are relying on Splunk to detect your events, given the sourcetype name of gatewaySync-too_small. I recommend you are explicit in defining your sourcetype on the receiving indexer(s) by creating a props.conf file and specifying the settings you want to apply.

Try this:

[yoursourcetypename]
BREAK_ONLY_BEFORE=^\d+:\d+:d+\.\d+
SHOULD_LINEMERGE=false
TIME_FORMAT=%H:%M:%S.%3N

Then set sourcetype=yoursourcetypename in inputs.conf on your forwarder.

This presentation may be helpful, if you are new to Splunk; relevant stuff starting on slide 23.

sundareshr
Legend

Try adding this to your props.conf on the indexer and restart splunk

[sourcetype_stanza_name]
SHOULD_LINEMERGE=true
TIME_FORMAT=%H:%M:%S.%3N
0 Karma

dbcase
Motivator

Hi,

All great answers but I have splunk cloud and therefore no access to props.conf.

I did try this but..... now I get no events 😞

[root@pds2 bin]# ./splunk add monitor /home/icontrol/ucontrol/logs/gatewaySync.log -index pds2 -sourcetype _json

Any way to do this just by using inputs.conf???

0 Karma

s2_splunk
Splunk Employee
Splunk Employee

This answers post should give you a pretty good overview of how to work with SplunkCloud for both search-time as well as index-time settings.

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...