Getting Data In

How to configure Splunk to line break events into multiple lines instead of one line?

jguzowski
Engager

I have events coming in all in one line like:

timestamp="2017-5-19 13:00:00.000", level="INFO", machine_name="blahblah1", app="cool_app".  

I'd like to have it separate out like this:

timestamp=2017-5-19 13:00:00.000
level=INFO
machine_name=blahblah1
app=cool_app

How would I go about approaching this? I'm assuming I need to utilize props.conf and transforms.conf to do this.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I'm not sure why you would want to do this as you will lose the association between the fields. If you really want to try it, props.conf is what you need.

[mysourcetype]
LINE_BREAKER = [\r\n,]+
---
If this reply helps you, Karma would be appreciated.
0 Karma

woodcock
Esteemed Legend

I agree with @richgalloway. IMHO, nobody should do this BUT if you do, be aware that you will get a tone of warnings in your logs which say something like "WARN: could not find timestamp; timestamp defaulted to that of the previous event" which is exactly the correct thing to do (but you will not be able to stop the warnings).

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...