Splunk Search

Group log entries by a start line and end line containing a certain string

mikefisher
New Member

I have somewhat of an unwieldy log file I'm trying to wrangle. Each log entry is contained between two lines like so:

<TIMESTAMP> BEGIN LOG DECODE

log data

log data

log data

<TIMESTAMP> END LOG DECODE

 

What's the best way to grab everything in between and start to extract fields and such?

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Have these events already been ingested? Can you share some anonymised _raw events in a code block </>

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...