Dashboards & Visualizations

Json logs not parsing properly.

mahesh27
Communicator

Hi All, We have a json logs where few logs are not parsing properly. When i check internal logs its shows that truncate value exceed the default 10000 bytes, so i tried increasing truncate value to 40000, but still logs are not parsing correctly.

the logs length is around  26000.

props used:

[app:json:logs]
SHOULD_LINEMERGE=true
LINE_BREAKER=([\r\n]+)
CHARSET=UTF-8
TIMEPREFIX=\{\"timestamp"\:\"
KV_MODE=json
TRUNCATE=40000

 

 

0 Karma

nmohammed
Builder

Try adding a limits.conf with the following

[kv]
maxchars = 40000
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @mahesh27 ,

try to add INDEXED_EXTRACTIONS = JSON to your props.conf

Ciao.

Giuseppe

0 Karma

mahesh27
Communicator

Hi @gcusello, sorry we have a limitation not to use that is there any other way 

0 Karma

gcusello
SplunkTrust
SplunkTrust
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...