Hi,
I have logs that have in the top some data that doesn't relevant for me and I would like that it won't appear.
Device version: D02.20.33
MCFG Version: Unknown
emory pool at 0x000000008f000000, size 8 MiB
also, I have some rows in the log that not include a timestamp and I want to add the same timestamp as the one in the next line. for example, this is the logs:
--------- beginning of events
01-15 04:17:19.370 453 453 I auditd : type=2000 audit(0.0:1): initialized
and I would like that it will be:
01-15 04:17:19.370 453 453 --------- beginning of events
01-15 04:17:19.370 453 453 I auditd : type=2000 audit(0.0:1): initialized
can I do that with Splunk when I'm uploading the logs?
Thank you!
The first part probably can be done using SEDCMD
in props.conf if you can come up with a regex that matches the lines to remove.
The second part, however, is not possible in Splunk. You'll need to create a scripted input or use a pre-processor such as Cribl (not sure Cribl can do that, though).
Thank you!
Splunk default associates this line to the previous event, maybe there is some option to associate this line with the next event?
There is no such option. That's why I said "not possible".
thanks 🙂