Getting Data In

Splunk extracting a single event into 4 separate logs


Currently using a UF to forward logs to Splunk.

Each .log file in the directory is 1 event but Splunk is separating each event into 4 separate logs.

I have added a custom app on the search head with a props.conf file as follows:

TRUNCATE = 99999999

Restarted Splunk but events are still separated into 4 events.

Anyone have any idea how to fix this.


Labels (3)
0 Karma


Hi @nathanluke86,

Since you see 4 events, it is not TRUNCATE problem. LINE_BREAKER may not be enough, most probably the problem is TIME_PREFIX.

You should add TIME_PREFIX and TIME_FORMAT into your props.conf at indexers. If there is no TIME inside the event, you can use DATETIME_CONFIG = CURRENT

If this reply helps you an upvote is appreciated.
0 Karma


To know whether the props.conf settings are correct requires some sample data.  Please share the same.

Props.conf settings for line breaking events must be installed on the indexer(s) rather than the search heads (unless you have a standalone installation).

If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Build Scalable Security While Moving to Cloud - Guide From Clayton Homes

 Clayton Homes faced the increased challenge of strengthening their security posture as they went through ...

Mission Control | Explore the latest release of Splunk Mission Control (2.3)

We’re happy to announce the release of Mission Control 2.3 which includes several new and exciting features ...

Cloud Platform | Migrating your Splunk Cloud deployment to Python 3.7

Python 2.7, the last release of Python 2, reached End of Life back on January 1, 2020. As part of our larger ...