Splunk Cloud Platform

How to parse jenkins logs?

sarit_s6
Engager

Hello

I'm using Splunk cloud, i have jenkins logs indexed to my system but for some reason breaks

I took an output example and add it to Splunk with the "Add Data" option and there it looks ok but when im searching for the sourcetype it is still broken.

What is the best way to parse jenkins logs ?

this is my sourcetype configuration :

 

[ console_logs ]
CHARSET=UTF-8
LINE_BREAKER=([\r\n]+)
NO_BINARY_CHECK=true
SHOULD_LINEMERGE=true
category=Structured
disabled=false
pulldown_type=true

 

and i want it to be shown with the bulks :

 

<time> Started by user
<time> Finished:

 

 

Labels (1)
Tags (2)
0 Karma

VatsalJagani
SplunkTrust
SplunkTrust

@sarit_s6 - Kindly provide sample raw data and tell how you would like to see the events being broken, so we can help.

 

0 Karma

sarit_s6
Engager
Hello
Thanks for your reply
I cannot attach the real logs but let have an example
The log will start with timestamp so
08:30:23 Started by Sarit Shvartzman
Raw
Raw
Raw
08:32:34 Finished:
I want all of this to be in one event
Instead of as it now that it breaks by raw
Tags (1)
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...