Getting Data In

How to merge lines based on timestamps?

thompsonsgg
New Member

Attached is a screenshot of the way my logs are appearing in Splunk. They match the log files themselves exactly, separating out each entry regardless of the timestamp. The pattern is the same for each new event (INFO | JVM1...) and we want to try to “linemerge” events that have the same exact timestamps (Examples hightlighted).

How would I approach this issue?

Thanks!

alt text

0 Karma

yannK
Splunk Employee
Splunk Employee

At search time, try the transaction command.

Or use the poor man transaction " ... | stats values(_raw) by source sourcetype host index _time "

richgalloway
SplunkTrust
SplunkTrust

Do you want to merge them at index time or search time?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Avantika
New Member

@richgalloway How to do it during index time? What changes need to be made in line break settings?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You may be able to adjust the props.conf settings to change how events are ingested.  Can you share raw events?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...