Getting Data In

still splitting on blank line

tgiles
Path Finder

Hi, All.

I'm trying to parse trend micro logs on a windows system using a heavy forwarder. Running into issues getting the entries to split in the right spot.

* Date Time:[20120404 00:10:46]
* Server Information: 
        Server Name:[myserver.com]  IP:[192.168.0.1]  Port:[80]
* Client Information: 
        Computer Name:[SERVER1]  Port:[38292]
        Client IP:[10.200.0.200  ] 
        GUID:[af697491-b868-48d3-b868-fa13854d48d3] 
* Action: Scheduled Update
* Result: Scheduled Update, Started

=========================================================================================

Splunk splits on ([\r\n]+), so something like the above will end up making two event entries in Splunk when only one actual entry is made to the log file itself.

  • I've defined the TIME_FORMAT and TIME_PREFIX attempted to BREAK_ONLY_BEFORE_DATE, but that didn't work.
  • I've configured the MUST_BREAK_AFTER to the long "===" line, but it didn't.
  • I've set the MUST_NOT_BREAK_AFTER to the default break regex, but it still broke in the same place.
  • Also attempted to use a SEDCMD to remove the long "===" line completely, but it didn't work, either.

I'm running out of really good ideas on how to force the entire entry into just one Splunk event. Mind pointing me in the right direction on this?

Thanks!

tom

Tags (2)

tgiles
Path Finder

In the end, I used a SEDCMD just to remove the errant extra line that Splunk was splitting on. In the props.conf, I added:

[host::*]
SEDCMD-avlog = s/=========================================================================================//g

That works.

kristian_kolb
Ultra Champion

I'd suggest that you alter your props.conf on the Heavy Forwarder accordingly;

[your_sourcetype_whatever_it's_called]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+={10,100})

This should use the newline(s), followed by anything between 10 and 100 '='-characters as the break between events. There should be no MUST_BREAK.., BREAK_ONLY.. etc, but you could/should still have the TIME_FORMAT / TIME_PREFIX / MAX_TIMESTAMP_LOOKAHEAD.

Hope this helps,

Kristian

0 Karma

tgiles
Path Finder

Thanks for the response, Kristian. Unfortunately, the logs are still getting split on the blank line- creating two entries.

Will keep reviewing to see if there's an alternate method available to this.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...