Splunk Search

how can i do to make this events into Splunk?

lightech1
Path Finder

hello team!

We have this logs comming in a port 10162 (say that this is a kind of "syslog" but it comes with a lot of special characters :

alt text

I have been trying a lot of sourcetypes and sometimes the splunk took a little portion of the log, for example:

alt text

So finally I make a custom sourcetype but now the splunk dont process any event. The configuration of the sourcetype is:
binary_check is false
truncate is in 0

Thanks!

Tags (1)
0 Karma

ssadanala1
Contributor

The values with \x are garbage values coming into splunk which is making logs looks unformated .

usage of sed command in props will remove those garbage value and make logs look formatted .

Please include below in your props and test it

[sourcetype]
SEDCMD-null = s/\x82//g

0 Karma

chrisyounger
SplunkTrust
SplunkTrust

Hi @lightech1

Someone else might have a better answer than me, but I would make sure this parsing props is set - which should fix the wierd line breaking

SHOULD_LINEMERGE = false

As you have said, NO_BINARY_CHECK = false should be also set on the place where data is ingested.

All the best

0 Karma
Get Updates on the Splunk Community!

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...