Splunk Enterprise

Why is Splunk deleting 0 during parsing?

bosseres
Contributor

Hello, everyone!

I collect script logs from light forwarders to indexers directly. Logs looks like:

0348788934="Y";

0304394493="N";

0874844788="Y";

etc.

 

When in automatically parses on splunk i got fields 348788934=Y, 304394493=N and so on...

I did props.conf on indexers:

 

[my_sourcetype]

FIELD_DELIMETERS=;

 

but still not working, can anybody help?

Thank you

Labels (2)
0 Karma

mayurr98
Super Champion

Hi is it a multiline event? if yes, could you please put an example of an entire raw event.

bosseres
Contributor

will correct myself

logs starting with 0, but next goes letter, like this:

0HFGHWGHR = "Y";

0RURURIIRJS = "N";

0 Karma
Get Updates on the Splunk Community!

Registration for Splunk University is Now Open!

Are you ready for an adventure in learning?   Brace yourselves because Splunk University is back, and it's ...

Splunkbase | Splunk Dashboard Examples App for SimpleXML End of Life

The Splunk Dashboard Examples App for SimpleXML will reach end of support on Dec 19, 2024, after which no new ...

Understanding Generative AI Techniques and Their Application in Cybersecurity

Watch On-Demand Artificial intelligence is the talk of the town nowadays, with industries of all kinds ...