Splunk Search

find broken events

mataharry
Communicator

How to figure which events are broken or truncated by splunk.
I know that the default is 256 lines for multiline events, and 10000 char for a single line.

I want to optimize my sourcetypes props.conf, but I cannot identify which ones are being cut.

1 Solution

yannK
Splunk Employee
Splunk Employee

Hi Mata,

  • For one part you can use the internal logs of the indexers, look for events like
    WARN  LineBreakingProcessor - Truncating line because limit of 10000 has been exceeded: 10868
    WARN  AggregatorMiningProcessor - Breaking event because limit of 256 has been exceeded
    

Use this search to see the evolution of the number of errors.


index=_internal source=splunkd.log WARN "Truncating" OR "Breaking event" | timechart count by component

  • For the other part, you can search in the actual real events to find the cut ones.

Look for events cut at exactly 257 lines (or higher for certain sourcetype)


index=storm_splunk linecount>256 | stats count values(source) values(sourcetype) values(host) values(index) by linecount

Look for events that are cut a 10000 characters.

index=storm_splunk | eval event_len=len(_raw) | WHERE event_len > 9999 | stats count values(source) values(sourcetype) values(host) values(index) by event_len

[edit] value fixed

View solution in original post

yannK
Splunk Employee
Splunk Employee

Hi Mata,

  • For one part you can use the internal logs of the indexers, look for events like
    WARN  LineBreakingProcessor - Truncating line because limit of 10000 has been exceeded: 10868
    WARN  AggregatorMiningProcessor - Breaking event because limit of 256 has been exceeded
    

Use this search to see the evolution of the number of errors.


index=_internal source=splunkd.log WARN "Truncating" OR "Breaking event" | timechart count by component

  • For the other part, you can search in the actual real events to find the cut ones.

Look for events cut at exactly 257 lines (or higher for certain sourcetype)


index=storm_splunk linecount>256 | stats count values(source) values(sourcetype) values(host) values(index) by linecount

Look for events that are cut a 10000 characters.

index=storm_splunk | eval event_len=len(_raw) | WHERE event_len > 9999 | stats count values(source) values(sourcetype) values(host) values(index) by event_len

[edit] value fixed

yannK
Splunk Employee
Splunk Employee

thanks, number fixed

0 Karma

mslvrstn
Communicator

Your final example has one too many 9's in the conditional. Should be
index=storm_splunk | eval event_len=len(_raw) | WHERE event_len > 9999 | stats count values(source) values(sourcetype) values(host) values(index) by event_len

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...