Security

How to change max limit of event from 10000 bytes in Splunk Cloud ?

ajinkya0106aexp
New Member

How to change max limit of event from 10000 bytes in Splunk Cloud ?

Tags (2)
0 Karma

jherring_splunk
Splunk Employee
Splunk Employee

Best practice is to create an app, call it (your_company_name)_all_indexers or something to that effect, create a default subdirectory and in there populate an app.conf (requirement for Splunk Cloud in particular for versioning) and a props.conf. Splunk best practice is to create apps with the name of the authoring organization and the app's target component in the infrastructure (can be a Splunk tier, a particular source, etc etc). In this case I chose "all_indexers" as the target tier.

In the props.conf put the TRUNCATE=(some #>10000) in the stanzas you create per the Splunk documentation for props (Google Splunk props.conf.spec).

Then, submit it for distribution to your indexers from the cluster master.

0 Karma

harsmarvania57
Ultra Champion

I guess you need to contact Splunk Support team to change this value in conf file directly for respective sourcetype.

0 Karma

adonio
Ultra Champion

indeed, contact your Cloud Support team.
if you can not, find out who in your organization has their name on the account

0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...