Splunk Search

Palo/Splunk Parsing Issue - Field values are Truncating

ghostdog920
Path Finder

Having a strange issue and not sure what my culprit/problem is.  Have a panorama to syslogng to Heavy Forwarder to Indexer with a single search head.  I see the parsing (I think) where fields are found and values= but they are truncating.  Specifically, my raw event has this in it:

before_change_detail="Emergency by IP { static [ ""Jim CentOS"" ]; } " after_change_detail=Emergency by IP { }

 

but when i look at the field values, this is what i get:

ghostdog920_0-1623784274273.png

 

Any ideas on why my field values are getting cut short?

Labels (1)
0 Karma
1 Solution

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

View solution in original post

0 Karma

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

0 Karma
Get Updates on the Splunk Community!

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Get Inspired! We’ve Got Validation that Your Hard Work is Paying Off

We love our Splunk Community and want you to feel inspired by all your hard work! Eric Fusilero, our VP of ...

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...