Need to break a log file into multiple events while indexing if there are no newline characters
sample log file data:
\xE1\xA\x01\x00RFD \x00\x00\x00\x1\x00\x00\x7\x00\x00\x00\x3\x11\x00\x00\x33MQSIR \x00\x00\x00\x00\x00\x00\x4\xB8\x00\x00\x01H
Highlighted text is the starting of second event in the log
You can try setting the line breaker in props.conf. This regex will look for whitespace at least 35 characters long, and then split the line. This will require a restart of Splunk.
[my_sourcetype]
LINE_BREAKER = (\s{35,})
You can try setting the line breaker in props.conf. This regex will look for whitespace at least 35 characters long, and then split the line. This will require a restart of Splunk.
[my_sourcetype]
LINE_BREAKER = (\s{35,})