Splunk Search

Palo/Splunk Parsing Issue - Field values are Truncating

ghostdog920
Path Finder

Having a strange issue and not sure what my culprit/problem is.  Have a panorama to syslogng to Heavy Forwarder to Indexer with a single search head.  I see the parsing (I think) where fields are found and values= but they are truncating.  Specifically, my raw event has this in it:

before_change_detail="Emergency by IP { static [ ""Jim CentOS"" ]; } " after_change_detail=Emergency by IP { }

 

but when i look at the field values, this is what i get:

ghostdog920_0-1623784274273.png

 

Any ideas on why my field values are getting cut short?

Labels (1)
0 Karma
1 Solution

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

View solution in original post

0 Karma

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...