Getting Data In

How to configure Splunk to line break events into multiple lines instead of one line?

jguzowski
Engager

I have events coming in all in one line like:

timestamp="2017-5-19 13:00:00.000", level="INFO", machine_name="blahblah1", app="cool_app".  

I'd like to have it separate out like this:

timestamp=2017-5-19 13:00:00.000
level=INFO
machine_name=blahblah1
app=cool_app

How would I go about approaching this? I'm assuming I need to utilize props.conf and transforms.conf to do this.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I'm not sure why you would want to do this as you will lose the association between the fields. If you really want to try it, props.conf is what you need.

[mysourcetype]
LINE_BREAKER = [\r\n,]+
---
If this reply helps you, Karma would be appreciated.
0 Karma

woodcock
Esteemed Legend

I agree with @richgalloway. IMHO, nobody should do this BUT if you do, be aware that you will get a tone of warnings in your logs which say something like "WARN: could not find timestamp; timestamp defaulted to that of the previous event" which is exactly the correct thing to do (but you will not be able to stop the warnings).

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...