Getting Data In

Splunk extracting a single event into 4 separate logs

nathanluke86
Communicator

Currently using a UF to forward logs to Splunk.

Each .log file in the directory is 1 event but Splunk is separating each event into 4 separate logs.

I have added a custom app on the search head with a props.conf file as follows:

[RMAN]
SHOULD_LINEMERGE = false
LINE_BREAKER = ((*FAIL))
TRUNCATE = 99999999

Restarted Splunk but events are still separated into 4 events.

Anyone have any idea how to fix this.

TIA

Labels (3)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @nathanluke86,

Since you see 4 events, it is not TRUNCATE problem. LINE_BREAKER may not be enough, most probably the problem is TIME_PREFIX.

You should add TIME_PREFIX and TIME_FORMAT into your props.conf at indexers. If there is no TIME inside the event, you can use DATETIME_CONFIG = CURRENT

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

To know whether the props.conf settings are correct requires some sample data.  Please share the same.

Props.conf settings for line breaking events must be installed on the indexer(s) rather than the search heads (unless you have a standalone installation).

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...