Getting Data In

How to merge lines based on timestamps?

thompsonsgg
New Member

Attached is a screenshot of the way my logs are appearing in Splunk. They match the log files themselves exactly, separating out each entry regardless of the timestamp. The pattern is the same for each new event (INFO | JVM1...) and we want to try to “linemerge” events that have the same exact timestamps (Examples hightlighted).

How would I approach this issue?

Thanks!

alt text

0 Karma

yannK
Splunk Employee
Splunk Employee

At search time, try the transaction command.

Or use the poor man transaction " ... | stats values(_raw) by source sourcetype host index _time "

richgalloway
SplunkTrust
SplunkTrust

Do you want to merge them at index time or search time?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Avantika
Explorer

@richgalloway How to do it during index time? What changes need to be made in line break settings?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You may be able to adjust the props.conf settings to change how events are ingested.  Can you share raw events?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...