Splunk Enterprise

Field truncation at index time

eduardo1989
Path Finder

Hello All,

I have faced interesting issue. I have an ingest time extraction.
[extract]
REGEX = ^([^\r\n]+)$
FORMAT = message::$1
DEST_KEY = _raw
Truncation not the case, I set it to zero and the whole event is not longer than 5000 characters BUT the message field is truncated exactly after 4023 characters.
Where it is written that an extracted field cannot be longer than this amount of characters.
Thanks.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...