<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic spath truncation in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382015#M20235</link>
    <description>&lt;P&gt;We have a log format which contains a JSON payload.  When we attempt to parse using spath, anything after a certain character limit is getting missed.  We have tried setting:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[spath]
# number of characters to read from an XML or JSON event when auto extracting
extraction_cutoff = 10000
max_mem_usage_mb = 500
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(up from 5000 and 200 in the defaults/limits.conf file respectively) but it made no difference.  Is there some other setting that may be responsible?&lt;/P&gt;

&lt;P&gt;Thanks, David.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Nov 2018 06:31:38 GMT</pubDate>
    <dc:creator>davidmills</dc:creator>
    <dc:date>2018-11-12T06:31:38Z</dc:date>
    <item>
      <title>spath truncation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382015#M20235</link>
      <description>&lt;P&gt;We have a log format which contains a JSON payload.  When we attempt to parse using spath, anything after a certain character limit is getting missed.  We have tried setting:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[spath]
# number of characters to read from an XML or JSON event when auto extracting
extraction_cutoff = 10000
max_mem_usage_mb = 500
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(up from 5000 and 200 in the defaults/limits.conf file respectively) but it made no difference.  Is there some other setting that may be responsible?&lt;/P&gt;

&lt;P&gt;Thanks, David.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 06:31:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382015#M20235</guid>
      <dc:creator>davidmills</dc:creator>
      <dc:date>2018-11-12T06:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: spath truncation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382016#M20236</link>
      <description>&lt;P&gt;We added the settings in $SPLUNK_HOME/etc/system/local/limits.conf and then restarted the 3 Search Head Cluster instances.&lt;BR /&gt;
The command:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk btool limits list
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;shows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[spath]
extract_all = true
extraction_cutoff = 10000
max_mem_usage_mb = 500
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;suggesting that the new settings will have been picked up by the restarts.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 02:47:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382016#M20236</guid>
      <dc:creator>davidmills</dc:creator>
      <dc:date>2018-11-13T02:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: spath truncation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382017#M20237</link>
      <description>&lt;P&gt;1) Have you validated that the JSON is well formed, using any of the various web tools?&lt;/P&gt;

&lt;P&gt;2) What is the number of characters it is cutting off at?  Have you experimented to determine the precise cutoff?  &lt;/P&gt;

&lt;P&gt;3) Have you verified that the entire JSON has been ingested and is retained in your index?  &lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 22:31:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382017#M20237</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2018-11-13T22:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: spath truncation</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382018#M20238</link>
      <description>&lt;P&gt;I think that amending limits.conf will sort your issue.  Have you indexed new data since making the amendment to limits.conf?  The new spath threshold will not be applied retroactively.&lt;/P&gt;

&lt;P&gt;We had a very similar issue recently where some user AD profiles were upwards to 15k characters due to global group memberships.  Raising the limit to 20k solved the problem, but we couldn't validate until new data had been indexed (daily pull).&lt;/P&gt;

&lt;P&gt;EDIT:  Have you used a tool such as &lt;A href="http://www.charactercountonline.com/"&gt;http://www.charactercountonline.com/&lt;/A&gt; to confirm that you are raising the limits to the correct level?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 05:24:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/spath-truncation/m-p/382018#M20238</guid>
      <dc:creator>MikeElliott</dc:creator>
      <dc:date>2018-11-14T05:24:06Z</dc:date>
    </item>
  </channel>
</rss>

