Splunk Search

Palo/Splunk Parsing Issue - Field values are Truncating

ghostdog920
Path Finder

Having a strange issue and not sure what my culprit/problem is.  Have a panorama to syslogng to Heavy Forwarder to Indexer with a single search head.  I see the parsing (I think) where fields are found and values= but they are truncating.  Specifically, my raw event has this in it:

before_change_detail="Emergency by IP { static [ ""Jim CentOS"" ]; } " after_change_detail=Emergency by IP { }

 

but when i look at the field values, this is what i get:

ghostdog920_0-1623784274273.png

 

Any ideas on why my field values are getting cut short?

Labels (1)
0 Karma
1 Solution

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

View solution in original post

0 Karma

ghostdog920
Path Finder

Finally got this all straightened out.  Needed to use cef utils for splunk along with a separate syslog destination from my panorama with custom cef events setup for the config section to get what i wanted.

0 Karma
Get Updates on the Splunk Community!

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...