Getting Data In

Splunk extracting a single event into 4 separate logs


Currently using a UF to forward logs to Splunk.

Each .log file in the directory is 1 event but Splunk is separating each event into 4 separate logs.

I have added a custom app on the search head with a props.conf file as follows:

TRUNCATE = 99999999

Restarted Splunk but events are still separated into 4 events.

Anyone have any idea how to fix this.


Labels (3)
0 Karma


Hi @nathanluke86,

Since you see 4 events, it is not TRUNCATE problem. LINE_BREAKER may not be enough, most probably the problem is TIME_PREFIX.

You should add TIME_PREFIX and TIME_FORMAT into your props.conf at indexers. If there is no TIME inside the event, you can use DATETIME_CONFIG = CURRENT

If this reply helps you an upvote is appreciated.
0 Karma


To know whether the props.conf settings are correct requires some sample data.  Please share the same.

Props.conf settings for line breaking events must be installed on the indexer(s) rather than the search heads (unless you have a standalone installation).

If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In the last month, the Splunk Threat Research Team (STRT) has had 2 releases of new security content via the ...

Announcing the 1st Round Champion’s Tribute Winners of the Great Resilience Quest

We are happy to announce the 20 lucky questers who are selected to be the first round of Champion's Tribute ...

We’ve Got Education Validation!

Are you feeling it? All the career-boosting benefits of up-skilling with Splunk? It’s not just a feeling, it's ...