Deployment Architecture

Gone part of the event when indexing

fridays
Explorer

Hello. We have a problem with the event handling in splunk. We get events from AWS S3 and one of the events are indexed ill, missing part of the event. We do not understand how it happened and how to understand where to look for the problem

Tags (1)
0 Karma

somesoni2
SplunkTrust
SplunkTrust

During the event processing in Splunk, as part of Event Breaking step, Splunk applies various limits on the amount of data that can be part of an event. Few of them are TRUNCATE which defines the maximum length of a line in bytes (default to 10,000 bytes) and MAX_EVENTS which defines the max number of lines in an event can have (default to 256 lines). These two entries can cause an event to get truncated if they exceed these generous limit. Check the event that got truncated is very long. Also, you can check splunkd logs on index=_internal sourcetype=splunkd component=LineBreakingProcessor log_level!=INFO for such warning/errors.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Data/Configureeventlinebreaking#Line_breaking_gene...

0 Karma
Get Updates on the Splunk Community!

.conf23 | Get Your Cybersecurity Defense Analyst Certification in Vegas

We’re excited to announce a new Splunk certification exam being released at .conf23! If you’re going to Las ...

Streamline Data Ingestion With Deployment Server Essentials

REGISTER NOW!Every day the list of sources Admins are responsible for gets bigger and bigger, often making the ...

Remediate Threats Faster and Simplify Investigations With Splunk Enterprise Security ...

REGISTER NOW!Join us for a Tech Talk around our latest release of Splunk Enterprise Security 7.2! We’ll walk ...