Security

How to change max limit of event from 10000 bytes in Splunk Cloud ?

ajinkya0106aexp
New Member

How to change max limit of event from 10000 bytes in Splunk Cloud ?

Tags (2)
0 Karma

jherring_splunk
Splunk Employee
Splunk Employee

Best practice is to create an app, call it (your_company_name)_all_indexers or something to that effect, create a default subdirectory and in there populate an app.conf (requirement for Splunk Cloud in particular for versioning) and a props.conf. Splunk best practice is to create apps with the name of the authoring organization and the app's target component in the infrastructure (can be a Splunk tier, a particular source, etc etc). In this case I chose "all_indexers" as the target tier.

In the props.conf put the TRUNCATE=(some #>10000) in the stanzas you create per the Splunk documentation for props (Google Splunk props.conf.spec).

Then, submit it for distribution to your indexers from the cluster master.

0 Karma

harsmarvania57
Ultra Champion

I guess you need to contact Splunk Support team to change this value in conf file directly for respective sourcetype.

0 Karma

adonio
Ultra Champion

indeed, contact your Cloud Support team.
if you can not, find out who in your organization has their name on the account

0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...