Getting Data In

LINE_BREAKER=([\r\n]+) not working?

bitnapper
Path Finder

Hi,

I have a test instance of splunk - fresh out of the box. Only configure the essentials and imported a dump from the  OpenLibrary.org. I have the problem that every single line should be one event but plenty of lines are merged together and I can't figure out why. The source data has reliable linebreaks in so the default should work.

I had the same issue in my enterprise environment and nobody could tell me why this is happening. After a while it magically disappeared and as far as I can tell it has vanished for good but I'd like to understand the reason why this is happening and prevent it from happening again.

Regards

Thorsten

Labels (1)
Tags (1)
0 Karma

bitnapper
Path Finder

Screenshot 2023-03-04 at 11-17-30 Daten hinzufügen – Sourcetyp festlegen Splunk 9.0.4.png

Hi Fabrizio,

thanks for you input. I had linemerge to false to avoid exactly that. Also I configure a one-time import via web. I know that splunk likes restarts like a windows 3.11 but there is no point at which one can restart splunk. I goes directly after applying to importing the data.

 

0 Karma

LRF
Path Finder

Hi @bitnapper,

Without knowing what type of logs you are working with, I would assume your issue might be related to the use of the default LINE_BREAKER ([\r\n]+) while also keeping SHOULD_LINEMERGE = true (default setting).

SHOULD_LINEMERGE explanation from props.conf file:

* When you set this to "true", Splunk software combines several lines of data
  into a single multi-line event, based on values you configure
  in the following settings.
* When you set this to "false", Splunk software does not combine lines of
  data into multiline events.
* Default: true

When SHOULD_LINEMERGE is set to true, other settings (BREAK_ONLY_BEFORE_DATE (default), BREAK_ONLY_BEFORE, MUST_BREAK_AFTER...) are used to define how Splunk software builds multi-line events merging previously broken lines.

Also, remember to restart your Splunk instance where the new parsing rules are being applied (tipically HF/INDEXER or all-in-one architecture)

Hope this helps, have a nice day,

Fabrizio

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...