Splunk Search

TCP input gets only one event indexed

asnegina
New Member

I have fully configured cluster running Splunk 6.6.5. All indexers and search heads work properly with other inputs. I added new TCP input where 5 workstations send their logs. But I got only one event indexed (from one ws, on one indexer) and new events never show up. I've tested network communication, all ports are open, telnet packets fly smoothly. I also checked if indexers' queues become blocked, but they are not.
What could cause this issue?

0 Karma

teunlaan
Contributor

have you checked for data in "the past" or "in the furure"? If timestamp recognition goes wrong, data can be indexed at the wrong time

0 Karma

jbrocks
Communicator

Have you checked, if your one event is only one event? Sometimes if there are wring configs in props.conf. Splunk recognized multiple Events as just one event. Onother problem might be that the forwarder has no read access to the logfile. Some appliances can change access after writing to a file even if you configured the read access for the Splunk OS user.

0 Karma

asnegina
New Member

You are right, we had some issues with encoding and Splunk just dropped events after 10 kb limit was reached.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...