Getting Data In

How to configure Splunk to line break events into multiple lines instead of one line?

jguzowski
Engager

I have events coming in all in one line like:

timestamp="2017-5-19 13:00:00.000", level="INFO", machine_name="blahblah1", app="cool_app".  

I'd like to have it separate out like this:

timestamp=2017-5-19 13:00:00.000
level=INFO
machine_name=blahblah1
app=cool_app

How would I go about approaching this? I'm assuming I need to utilize props.conf and transforms.conf to do this.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I'm not sure why you would want to do this as you will lose the association between the fields. If you really want to try it, props.conf is what you need.

[mysourcetype]
LINE_BREAKER = [\r\n,]+
---
If this reply helps you, Karma would be appreciated.
0 Karma

woodcock
Esteemed Legend

I agree with @richgalloway. IMHO, nobody should do this BUT if you do, be aware that you will get a tone of warnings in your logs which say something like "WARN: could not find timestamp; timestamp defaulted to that of the previous event" which is exactly the correct thing to do (but you will not be able to stop the warnings).

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...