Getting Data In

Discard event after 10 lines

anantdeshpande
Path Finder

Hi,
I have many events of 500 lines. Only first 10 lines are important. How to truncate or discard or ignore the remaining lines before indexing?
When I use MAX_EVENTS in props.conf, Splunk breaks event after 10 lines and creats new event. Tried using BREAK_ONLY_BEFORE, LINEBREAK but nothing seems working.

Please suggest props.conf entry to index only 10 lines from event.

Tags (1)
0 Karma

inventsekar
SplunkTrust
SplunkTrust

Check this one -

In inputs.conf
[monitor:///app/tmp/testfile]
sourcetype = testSourceType
index = main
disabled = 0
whitelist = .log$

In props.conf
[testSourceType]
TRANSFORMS-shortenEvents = keepOnly10Lines

In transforms.conf
[keepOnly10Lines]
REGEX = (?m)^((.*\n){10})((.*\n)*)
FORMAT = $1
DEST_KEY = _raw

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !

anantdeshpande
Path Finder

Hi,
Thanks for the reply.
I am indexing file from Web UI. I created props.conf and transforms.conf in default directory as mentioned.
Restarted Splunk. Then, when I select sourcetype as" testSourceType", I see transforms name in Advance but the right hand side prieview still shows large events and not discarding lines after 10.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...