Security

How to change max limit of event from 10000 bytes in Splunk Cloud ?

ajinkya0106aexp
New Member

How to change max limit of event from 10000 bytes in Splunk Cloud ?

Tags (2)
0 Karma

jherring_splunk
Splunk Employee
Splunk Employee

Best practice is to create an app, call it (your_company_name)_all_indexers or something to that effect, create a default subdirectory and in there populate an app.conf (requirement for Splunk Cloud in particular for versioning) and a props.conf. Splunk best practice is to create apps with the name of the authoring organization and the app's target component in the infrastructure (can be a Splunk tier, a particular source, etc etc). In this case I chose "all_indexers" as the target tier.

In the props.conf put the TRUNCATE=(some #>10000) in the stanzas you create per the Splunk documentation for props (Google Splunk props.conf.spec).

Then, submit it for distribution to your indexers from the cluster master.

0 Karma

harsmarvania57
Ultra Champion

I guess you need to contact Splunk Support team to change this value in conf file directly for respective sourcetype.

0 Karma

adonio
Ultra Champion

indeed, contact your Cloud Support team.
if you can not, find out who in your organization has their name on the account

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...