Getting Data In

How to merge lines based on timestamps?

thompsonsgg
New Member

Attached is a screenshot of the way my logs are appearing in Splunk. They match the log files themselves exactly, separating out each entry regardless of the timestamp. The pattern is the same for each new event (INFO | JVM1...) and we want to try to “linemerge” events that have the same exact timestamps (Examples hightlighted).

How would I approach this issue?

Thanks!

alt text

0 Karma

yannK
Splunk Employee
Splunk Employee

At search time, try the transaction command.

Or use the poor man transaction " ... | stats values(_raw) by source sourcetype host index _time "

richgalloway
SplunkTrust
SplunkTrust

Do you want to merge them at index time or search time?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Avantika
Explorer

@richgalloway How to do it during index time? What changes need to be made in line break settings?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You may be able to adjust the props.conf settings to change how events are ingested.  Can you share raw events?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...