Few event logs are getting truncated while others are getting perfectly. We are using akamai add-on to pull logs to Splunk.
HF (akamai input configured) ---> sent to indexers
in DS all apps will be there (where all props and transforms) which will be pushed to CM and from CM will be pushing to individual indexers.
props.conf in DS (Ds --> CM --> IND)
when I checked more in depth logs, I see perfect logs have less than 10000 lines where the logs which are truncating have 10001 lines. But I set truncated value to 50000 why this is not applying?
You mention that the props/transforms are pushed to your Indexers, but is it also installed on the HF pulling the Akamai logs? Can you validate that the relevant props/transforms with the TRUNCATE set to a higher-than-longest-event value are installed on the HF?
$SPLUNK_HOME/bin/splunk btool props list sony_waf --debug
If you run this on your HF you should see your TRUNCATE value to the expected high value.
What length are your logs being truncated to?
Your approach of using DS->CM->IDX is interesting...but I dont think this is the problem here if the Akamai logs are being pulled by a HF - Ultimately we need to ensure the HF has the props!
🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing