Splunk Search

help on sourcetype customization for log parsing

jip31
Motivator

hello

I need to parse the kind of logs below

 

 

Microsoft Windows [version 10.0.18363.1198]
(c) 2019 Microsoft Corporation. Tous droits réservés.

C:\WINDOWS\system32>dir C:\Tools\F
 Le volume dans le lecteur C s’appelle OSDisk
 Le numéro de série du volume est 88FB-20D5

Répertoire de C:\Tools\F

05/10/2020  06:48                 0 ABD-UPDATED.$w$
06/09/2018  13:27                 0 Access Runtime 2013 (15.0_32b) EN.$w$
06/09/2018  13:27                 0 Access Runtime 2013 (15.0_32b) ENP00.$w$
06/09/2018  13:30                 0 Acrobat Reader DC (2015.006_32b) ML.$w$
06/09/2018  13:30                 0 Acrobat Reader DC (2015.006_32b) MLP00.$w$
01/10/2019  08:01                 0 User Data Backup (2.2_32b) ML.$w$
01/10/2019  08:01                 0 User Data Backup (2.2_32b) MLP01.$w$

 

 

I need to create events for lines just after

 

Répertoire de C:\Tools\F

 

It means that i need a new event for each timestamp and that I need to delete the first part of the log

how to do this please?

Labels (1)
Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @jip31,

I suppose that the logs to parse are the output of a script.

So, you could try something like this:

[your_sourcetype]
SHOULD_LINEMERGE=true
LINE_BREAKER=([\r\n]+)
NO_BINARY_CHECK=true

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jip31,

let me understand: do you want to extract a field with the content of repertoire or to delete the other contents of the event before indexing?

if you want to extract the field, you can use a regex liek this:

| rex "(?ms)Répertoire de (?<repertoire>\w:(\\\w+)*)"

that you can test at https://regex101.com/r/TSuiwO/1

Ciao.

Giuseppe

0 Karma

jip31
Motivator

Hi

Thanks but my question is about how doing this directly at sourcetype level

For example, what I have to add in LINE_BREAKER or somewhere else for having this log correctly parsed

Except if I am mistaken you regex works only for search usage

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jip31,

I suppose that the logs to parse are the output of a script.

So, you could try something like this:

[your_sourcetype]
SHOULD_LINEMERGE=true
LINE_BREAKER=([\r\n]+)
NO_BINARY_CHECK=true

Ciao.

Giuseppe

0 Karma

jip31
Motivator

Thanks to you

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jip31.,

good for you.

Ciao and happy splunking.

Giuseppe

P.S.: Karma Points are appreciated 😉

 

Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...