Getting Data In

still splitting on blank line

tgiles
Path Finder

Hi, All.

I'm trying to parse trend micro logs on a windows system using a heavy forwarder. Running into issues getting the entries to split in the right spot.

* Date Time:[20120404 00:10:46]
* Server Information: 
        Server Name:[myserver.com]  IP:[192.168.0.1]  Port:[80]
* Client Information: 
        Computer Name:[SERVER1]  Port:[38292]
        Client IP:[10.200.0.200  ] 
        GUID:[af697491-b868-48d3-b868-fa13854d48d3] 
* Action: Scheduled Update
* Result: Scheduled Update, Started

=========================================================================================

Splunk splits on ([\r\n]+), so something like the above will end up making two event entries in Splunk when only one actual entry is made to the log file itself.

  • I've defined the TIME_FORMAT and TIME_PREFIX attempted to BREAK_ONLY_BEFORE_DATE, but that didn't work.
  • I've configured the MUST_BREAK_AFTER to the long "===" line, but it didn't.
  • I've set the MUST_NOT_BREAK_AFTER to the default break regex, but it still broke in the same place.
  • Also attempted to use a SEDCMD to remove the long "===" line completely, but it didn't work, either.

I'm running out of really good ideas on how to force the entire entry into just one Splunk event. Mind pointing me in the right direction on this?

Thanks!

tom

Tags (2)

tgiles
Path Finder

In the end, I used a SEDCMD just to remove the errant extra line that Splunk was splitting on. In the props.conf, I added:

[host::*]
SEDCMD-avlog = s/=========================================================================================//g

That works.

kristian_kolb
Ultra Champion

I'd suggest that you alter your props.conf on the Heavy Forwarder accordingly;

[your_sourcetype_whatever_it's_called]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+={10,100})

This should use the newline(s), followed by anything between 10 and 100 '='-characters as the break between events. There should be no MUST_BREAK.., BREAK_ONLY.. etc, but you could/should still have the TIME_FORMAT / TIME_PREFIX / MAX_TIMESTAMP_LOOKAHEAD.

Hope this helps,

Kristian

0 Karma

tgiles
Path Finder

Thanks for the response, Kristian. Unfortunately, the logs are still getting split on the blank line- creating two entries.

Will keep reviewing to see if there's an alternate method available to this.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...