I have a Splunk Universal Forwarder (UF) installed on a Windows 2008 Server and it is forwarding logs to a Splunk Heavy Forwarder (HF). The HF is configured to forward all events via Syslog (TCP) to a 3rd party receiver.
The problem I'm having is that some of the more verbose Windows logs are being truncated at 1024 bytes (which comes out to around 952 characters). I understand that there may be an RFC 3164 limitation, but from what I read that was at the UF (and a pcap shows the full log message being sent from UF to HF).
Is there any way to edit or disable the 1024 byte truncation for events forwarded via Syslog from an HF? Or, if this is an RFC 3164 limitation, is there possibly a way to change the output to be RFC 5424 compliant?
Below is an example of event text and the random cutoff I'm experiencing:
HOST01 10/09/2014 07:29:56 PM LogName=Security SourceName=Microsoft Windows security auditing. EventCode=4688 EventType=0 Type=Information ComputerName=HOST01.domain1.com TaskCategory=Process Creation OpCode=Info RecordNumber=134491 Keywords=Audit Success Message=A new process has been created. Subject: Security ID: NT AUTHORITY\SYSTEM Account Name: HOST01$ Account Domain: DOMAIN1 Logon ID: 0x3e7 Process Information: New Process ID: 0xa70 New Process Name: C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe Token Elevation Type: TokenElevationTypeDefault (1) Creator Process ID: 0x8cc Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 i
props.conf under /opt/splunk/etc/system/local is empty and I do not see any config options in the doc you referenced related to manipulation of syslog output. any other suggestions that are relevant to the question above?