Splunk Search

Issues with event parsing using prop configuration file

SplunkDash
Motivator

Hello,

I have some issues with parsing events and a few sample events are given below:

{"eventVer":"2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:10:15", "statusCode":"active"} {"eventVer":"2.56", "userId":"A021", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:09:11", "statusCode":"active"} {"eventVer":"2.56", "userId":"A021", "accountId":"Adm02", "accessKey":"26dsaa", "time":"2023-12-03T09:09:08", "statusCode":"active"} {\"eventVer\":\"2.56", "userId":"B001", "accountId":"Test04", "accessKey":"21fsda", "time":"2023-12-03T09:09:04", "statusCode":"active"} {\"eventVer\":\"2.56", "userId":"B009", "accountId":"Adm01", "accessKey":"21assaa", "time":"2023-12-03T09:09:01", "statusCode":"active"} {"eventVer":"2.56", "userId":"B023", "accountId":"Adm01", "accessKey":"30tsaa", "time":"2023-12-03T09:08:55", "statusCode":"active"} {"eventVer":"2.56", "userId":"A025", "accountId":"Adm01", "accessKey":"21asaa", "time":"2023-12-03T09:08:51", "statusCode":"active"} {"eventVer":"2.56", "userId":"C015", "accountId":"Dev01", "accessKey":"41scab", "time":"2023-12-03T09:08:48", "statusCode":"active"}

The event breaking point is marked as Bold and I used 

LINE_BREAKER=([\r\n]*)\{"eventVer":"

in my prop.conf file, but not parsing all events as expected. Any recommendations will be highly appreciated. Thank you.

Labels (1)
Tags (1)
0 Karma
1 Solution

victor_menezes
Path Finder

Looks like you don't have nested json events in there, so have you tried to just regex by the } and { characters?

Try this:
[your_sourcetype]
SHOULD_LINEMERGE = false
LINE_BREAKER = \}\s+\{

View solution in original post

victor_menezes
Path Finder

Looks like you don't have nested json events in there, so have you tried to just regex by the } and { characters?

Try this:
[your_sourcetype]
SHOULD_LINEMERGE = false
LINE_BREAKER = \}\s+\{

Get Updates on the Splunk Community!

New Case Study Shows the Value of Partnering with Splunk Academic Alliance

The University of Nevada, Las Vegas (UNLV) is another premier research institution helping to shape the next ...

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...