Hi All,
Is there a possibility to send half of the event to index queue and half of the event to null queue??
Can this be done based on the size of the event, for example only 1Kb event should be indexed out of 1MB event and rest should be sent to null queue.
Thanks in advance for your inputs!
Regards,
BK
You have 2 options:
1: Have Splunk split it into 2 events and then throw away one of them. This is silly.
2: Use SEDCMD
to strip the bad part of the event and replace it with nothing. This rocks.
Hi bharathkumarnec,
you can use TRUNCATE in props.conf to limit the lenght of each event of a specified sourcetype.
Bye.
Giuseppe
Hi,
I have tried using Truncate in props.conf, but it did not help me out.
The logs are from kafka topic events.
Regards,
BK
with TRUNCATE you define the max lenght of your events.
If you can define a point of your events (e.g. a word or some chars) that you can use in a regex you can delete all chars after this word or chars.
Bye.
Giuseppe
My data is in JSON format, will regex take care of this for JSON events??
with regex you can parse every event, can you share an example of your logs?
Bye.
Giuseppe