Splunk Search

pattern based indexing is not working for some events

vasanthi77
Explorer

I am using pattern base indexing like below that is if i have splunk_send and app host in event i m trying to discard the event. which is working some times and sometimes it is not working.

using below props and transforms files

```

######more props.conf
[source::OCP]
SHOULD_LINEMERGE = false
TRUNCATE = 0
MAX_DAYS_AGO = 10000
TRANSFORMS-viprouting = customer3
######more transforms.conf
[customer3]
REGEX = (?s)(splunk_send).+?(xxxxx-app-c0[0-9]?\.abc\.abc\.cde\.fgh\.com)
FORMAT = nullQueue
DEST_KEY = queue
```

do we have any limitation on length of the event or anything else?
Please help me

0 Karma

mhoogcarspel_sp
Splunk Employee
Splunk Employee

Probably add

LOOKAHEAD = <something bigger than 4096>

https://docs.splunk.com/Documentation/Splunk/latest/Admin/Transformsconf

LOOKAHEAD = <integer>
* NOTE: This option is valid for all index time transforms, such as
  index-time field creation, or DEST_KEY modifications.
* Optional. Specifies how many characters to search into an event.
* Default: 4096
  * You may want to increase this value if you have event line lengths that
    exceed 4096 characters (before linebreaking).
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi vasanthi77,
can you share an example of not discarded logs?
Bye.
Giuseppe

Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...