<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enlarge index time extractions field limit in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480314#M9407</link>
    <description>&lt;P&gt;Check with below configurations:&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[_json]
TRUNCATE = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;limits.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[kv]
maxchars = 1024000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 02 Mar 2020 14:46:19 GMT</pubDate>
    <dc:creator>manjunathmeti</dc:creator>
    <dc:date>2020-03-02T14:46:19Z</dc:date>
    <item>
      <title>Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480312#M9405</link>
      <description>&lt;P&gt;I have HEC messages that are indexed with the sourcetype &lt;CODE&gt;_json&lt;/CODE&gt;. This is a build in Splunk source obviously and has the following configuration:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[_json]
pulldown_type = true
INDEXED_EXTRACTIONS = json
KV_MODE = none
category = Structured
description = JavaScript Object Notation format. For more information, visit &lt;A href="http://json.org/" target="test_blank"&gt;http://json.org/&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I have a problem however with the length of the indexed fields, they are truncated to &lt;STRONG&gt;1000&lt;/STRONG&gt; characters. I can't seem to figure out what field I should set to increase that limit.&lt;/P&gt;

&lt;P&gt;To give a bit more context, the HEC messages that I receive are roughly structured as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{
  "id": "35298092067921924966859073695563957796481621929900441603",
  "level": "INFO",
  "message": "2020-02-27T16:33:10.666Z  e18c650c-7d2d-4acc-bf9c-bfbb1fd0cec4    INFO    {\"message\":\"Error while ... \"}"
}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So we actually have an extract field called &lt;CODE&gt;message&lt;/CODE&gt; (and &lt;CODE&gt;id&lt;/CODE&gt; and &lt;CODE&gt;level&lt;/CODE&gt;) etc, but that field can be rather long and is truncated at 1000 characters.&lt;/P&gt;

&lt;P&gt;I've try to find this in the &lt;CODE&gt;limits.conf&lt;/CODE&gt; documentation, but I cannot find a definitive value there. Can somebody help me out? &lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 11:12:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480312#M9405</guid>
      <dc:creator>aukevanleeuwen</dc:creator>
      <dc:date>2020-02-28T11:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480313#M9406</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;

&lt;P&gt;I'm also not sure about the issue, but as per understanding you can try the below solution,&lt;BR /&gt;
- remove "Indexed_Extarction" line&lt;BR /&gt;
- add "KV_MODE = JSON"&lt;/P&gt;

&lt;P&gt;let me know if it works or not&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:26:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480313#M9406</guid>
      <dc:creator>gaurav_maniar</dc:creator>
      <dc:date>2020-09-30T04:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480314#M9407</link>
      <description>&lt;P&gt;Check with below configurations:&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[_json]
TRUNCATE = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;limits.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[kv]
maxchars = 1024000
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 02 Mar 2020 14:46:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480314#M9407</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2020-03-02T14:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480315#M9408</link>
      <description>&lt;P&gt;Thanks for the answer. The &lt;CODE&gt;TRUNCATE&lt;/CODE&gt; value I've already set to a value large enough for a single line. the &lt;CODE&gt;maxchars&lt;/CODE&gt; value is currently set to a bigger value than &lt;CODE&gt;1000&lt;/CODE&gt; so this is also unlikely. &lt;/P&gt;

&lt;P&gt;Hmm... I'm trying to reproduce using a plain &lt;CODE&gt;splunk/splunk:latest&lt;/CODE&gt; docker container, but there it seems to work. I.e. Values &amp;gt; 1000 get the correct field value (non-truncated). Maybe it's something on the Splunk Cloud side?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 15:07:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480315#M9408</guid>
      <dc:creator>aukevanleeuwen</dc:creator>
      <dc:date>2020-03-06T15:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480316#M9409</link>
      <description>&lt;P&gt;Even for pretty big values such as 200K characters.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 15:10:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480316#M9409</guid>
      <dc:creator>aukevanleeuwen</dc:creator>
      <dc:date>2020-03-06T15:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480317#M9410</link>
      <description>&lt;P&gt;From here:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Limitsconf"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Limitsconf&lt;/A&gt;&lt;BR /&gt;
Maybe this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[kv]
avg_extractor_time = &amp;lt;integer&amp;gt;
* Maximum amount of CPU time, in milliseconds, that the average (over search
  results) execution time of a key-value pair extractor will be allowed to take
  before warning. Once the average becomes larger than this amount of time a
  warning will be issued
* Default: 500 (.5 seconds)

limit = &amp;lt;integer&amp;gt;
* The maximum number of fields that an automatic key-value field extraction
  (auto kv) can generate at search time.
* The summary fields 'host', 'index', 'source', 'sourcetype', 'eventtype',
  'linecount', 'splunk_server', and 'splunk_server_group' do not count against
  this limit and will always be returned.
* Increase this setting if, for example, you have data with a large
  number of columns and want to ensure that searches display all fields extracted
  from an automatic key-value field (auto kv) configuration.
* Set this value to 0 if you do not want to limit the number of fields
  that can be extracted at index time and search time.
* Default: 100

indexed_kv_limit = &amp;lt;integer&amp;gt;
* The maximum number of fields that can be extracted at index time from a data source.
* Fields that can be extracted at index time include default fields, custom fields,
  and structured data header fields.
* The summary fields 'host', 'index', 'source', 'sourcetype', 'eventtype', 'linecount',
  'splunk_server', and 'splunk_server_group' do not count against this limit and are
  always returned.
* Increase this setting if, for example, you have indexed data with a large
  number of columns and want to ensure that searches display all fields from
  the data.
* Set this value to 0 if you do not want to limit the number of fields
  that can be extracted at index time.
* Default: 200

maxchars = &amp;lt;integer&amp;gt;
* Truncate _raw to this size and then do auto KV.
* Default: 10240 characters

maxcols = &amp;lt;integer&amp;gt;
* When non-zero, the point at which kv should stop creating new fields.
* Default: 512

max_extractor_time = &amp;lt;integer&amp;gt;
* Maximum amount of CPU time, in milliseconds, that a key-value pair extractor
  will be allowed to take before warning. If the extractor exceeds this
  execution time on any event a warning will be issued
* Default: 1000 (1 second)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 06 Mar 2020 15:27:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480317#M9410</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2020-03-06T15:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480318#M9411</link>
      <description>&lt;P&gt;@aukevanleeuwen try this search.  It will look for "truncating" messages in the _internal splunk index and let you know the largest it has seen and give you a recommended value to put in props.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="_internal" sourcetype=splunkd source="*splunkd.log" log_level="WARN" "Truncating" 
| rex "line length &amp;gt;= (?&amp;lt;line_length&amp;gt;\d+)" 
| stats values(host) as host values(data_host) as data_host count last(_raw) as common_events last(_time) as _time max(line_length) as max_line_length by data_sourcetype log_level 
| table _time host data_host data_sourcetype log_level max_line_length count common_events 
| rename data_sourcetype as sourcetype 
| eval number=max_line_length 
| eval recommeneded_truncate=max_line_length+100000 
| eval recommeneded_truncate=recommeneded_truncate-(recommeneded_truncate%100000) 
| eval recommended_config="# props.conf
["+sourcetype+"]
TRUNCATE = "+recommeneded_truncate 
| table _time host data_host sourcetype log_level max_line_length recommeneded_truncate recommended_config count common_events 
| sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Credit goes to @rob_jordan  as I found what he posted in this Answer: &lt;A href="https://answers.splunk.com/answers/155691/why-are-larger-events-are-truncated-10000-bytes.html"&gt;https://answers.splunk.com/answers/155691/why-are-larger-events-are-truncated-10000-bytes.html&lt;/A&gt;  &lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 05:09:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/480318#M9411</guid>
      <dc:creator>randy_moore</dc:creator>
      <dc:date>2020-04-23T05:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Enlarge index time extractions field limit</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/574793#M10703</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/46855"&gt;@aukevanleeuwen&lt;/a&gt;&amp;nbsp;, wondering if you were ever able to get indexed field extractions &amp;gt;1000 characters to work?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Nov 2021 22:38:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Enlarge-index-time-extractions-field-limit/m-p/574793#M10703</guid>
      <dc:creator>AaronJaques</dc:creator>
      <dc:date>2021-11-12T22:38:45Z</dc:date>
    </item>
  </channel>
</rss>

