Hello, I have log events that follow this structure: "2023-01-10 09:54:18.566 | ERROR | 1 | GroupManagement| ExceptionHandler | UUID CC22E78A-E62D-4693-8D89-0A54E159DDC5 | hasError | This is the error message " It has leading and trailing quotes, and is delimited with pipe character. I am having trouble with creating the sourcetype and require some assistance. My biggest issue I think is the fact that I have to remove the leading and trailing quotes so that Splunk does not treat the entire event as one field. I seem to be able to remove them using the following sourcetype, but it does not then identify the fields: [sourcetype] SHOULD_LINEMERGE=true LINE_BREAKER=([\r\n]+) NO_BINARY_CHECK=true CHARSET=UTF-8 disabled=false FIELD_DELIMITER=| FIELD_NAMES=timestamp,type,num,area,code,uuid,text,message TRUNCATE=20000 TIME_PREFIX=^ TIME_FORMAT=%Y-%m-%d %H:%M:%S,%3N SEDCMD-remove_quotes=s/(?<!,)\"([^\"]*)\"/\1/g Does anybody have an idea? Thank you and best regards, Andrew
... View more