Getting Data In

Splunk extracting a single event into 4 separate logs

nathanluke86
Communicator

Currently using a UF to forward logs to Splunk.

Each .log file in the directory is 1 event but Splunk is separating each event into 4 separate logs.

I have added a custom app on the search head with a props.conf file as follows:

[RMAN]
SHOULD_LINEMERGE = false
LINE_BREAKER = ((*FAIL))
TRUNCATE = 99999999

Restarted Splunk but events are still separated into 4 events.

Anyone have any idea how to fix this.

TIA

Labels (3)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @nathanluke86,

Since you see 4 events, it is not TRUNCATE problem. LINE_BREAKER may not be enough, most probably the problem is TIME_PREFIX.

You should add TIME_PREFIX and TIME_FORMAT into your props.conf at indexers. If there is no TIME inside the event, you can use DATETIME_CONFIG = CURRENT

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

To know whether the props.conf settings are correct requires some sample data.  Please share the same.

Props.conf settings for line breaking events must be installed on the indexer(s) rather than the search heads (unless you have a standalone installation).

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...