Hi,
I am just looking at a new data input in Splunk. In some cases I am seeing one timestamp per event which is what I would expect to see but in some cases, Splunk is placing all of the following under one event:
e.g. of one event in Splunk which has multiple timestamps:
2012-07-02 15:43:33.319, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
2012-07-02 15:43:33.531, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
2012-07-02 15:43:33.744, TZ="UTC", OsVersion="Microsoft Windows NT 6.1 Service Pack 1"
Ideally, Splunk should be showing this as three separate events and not one event where _time is 2012-07-02 15:43:33.319. How can this event to be chopped into three events with the three timestamps? How would this be done in props.conf? Thanks in advance for your help
I would try this in props.conf. See link below, the stanza can reference your sourcetype, host or source etc.
[yoursourcetype]
MAX_TIMESTAMP_LOOKAHEAD=25
SHOULD_LINEMERGE = true
BREAK_ONLY_BEFORE_DATE = true
You can see the other props.conf settings here: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf
Instructions for configuring event line breaking can be found here:
http://docs.splunk.com/Documentation/Splunk/latest/Data/Indexmulti-lineevents
I would try this in props.conf. See link below, the stanza can reference your sourcetype, host or source etc.
[yoursourcetype]
MAX_TIMESTAMP_LOOKAHEAD=25
SHOULD_LINEMERGE = true
BREAK_ONLY_BEFORE_DATE = true
You can see the other props.conf settings here: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf
Thanks, the latter two attributes are set to true by default