Getting Data In

still splitting on blank line

tgiles
Path Finder

Hi, All.

I'm trying to parse trend micro logs on a windows system using a heavy forwarder. Running into issues getting the entries to split in the right spot.

* Date Time:[20120404 00:10:46]
* Server Information: 
        Server Name:[myserver.com]  IP:[192.168.0.1]  Port:[80]
* Client Information: 
        Computer Name:[SERVER1]  Port:[38292]
        Client IP:[10.200.0.200  ] 
        GUID:[af697491-b868-48d3-b868-fa13854d48d3] 
* Action: Scheduled Update
* Result: Scheduled Update, Started

=========================================================================================

Splunk splits on ([\r\n]+), so something like the above will end up making two event entries in Splunk when only one actual entry is made to the log file itself.

  • I've defined the TIME_FORMAT and TIME_PREFIX attempted to BREAK_ONLY_BEFORE_DATE, but that didn't work.
  • I've configured the MUST_BREAK_AFTER to the long "===" line, but it didn't.
  • I've set the MUST_NOT_BREAK_AFTER to the default break regex, but it still broke in the same place.
  • Also attempted to use a SEDCMD to remove the long "===" line completely, but it didn't work, either.

I'm running out of really good ideas on how to force the entire entry into just one Splunk event. Mind pointing me in the right direction on this?

Thanks!

tom

Tags (2)

tgiles
Path Finder

In the end, I used a SEDCMD just to remove the errant extra line that Splunk was splitting on. In the props.conf, I added:

[host::*]
SEDCMD-avlog = s/=========================================================================================//g

That works.

kristian_kolb
Ultra Champion

I'd suggest that you alter your props.conf on the Heavy Forwarder accordingly;

[your_sourcetype_whatever_it's_called]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+={10,100})

This should use the newline(s), followed by anything between 10 and 100 '='-characters as the break between events. There should be no MUST_BREAK.., BREAK_ONLY.. etc, but you could/should still have the TIME_FORMAT / TIME_PREFIX / MAX_TIMESTAMP_LOOKAHEAD.

Hope this helps,

Kristian

0 Karma

tgiles
Path Finder

Thanks for the response, Kristian. Unfortunately, the logs are still getting split on the blank line- creating two entries.

Will keep reviewing to see if there's an alternate method available to this.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...