PowerConnect for SAP Solutions
Breadcrumbs

KB 89 - Splunk KV Extraction Limit

KB 89 (Splunk): Splunk KV Extraction Limit

Category: Information

Priority: Normal

Platform: Splunk

Version: 1 from 23.03.2021

Description

If the data in your Splunk instance may have an event size greater than 10240 characters then Splunk won’t auto-extract kv-pairs after 10240 characters. So there are two ways of overcoming this problem:

  1. Using props.conf (Note: This method only works if you have data in the form of JSON)

  2. Using limits.conf

Using props.conf

  • Go to $SPLUNK_HOME$/etc/apps/BNW-app-powerconnect/local/ directory.

image-20210527-174039.png
  • If there exist a file named props.conf then edit and if it doesn’t exist create one.

  • There are two ways you can apply the settings:

    • For specific sourcetype or host or source (preferred way)

    • Globally apply settings

For a specific sourcetype. host, or source:

For a specific sourcetype:

Let’s say you want to apply for sourcetype=sap:java

image-20210527-173936.png

For a specific source:

Let’s say you want to apply for source=N71

image-20210527-174000.png

For a specific host:

Let’s say you want to apply for host=SAPN71D

image-20210527-174016.png

Important Note: Restart Splunk for the changes to take effect

Globally apply settings:

Note: If there are same settings applied for any specific sourcetype, host or source then these settings won’t override them.
Add the following content to your props.conf file.


Important Note: Restart Splunk for the changes to take effect

Using limits.conf

  • Go to $SPLUNK_HOME$/etc/system/local/ directory.

image-20210527-174100.png
  • If there exist a file named limits.conf then edit and if it doesn’t exist create one.

  • Add the following content to the file:

Note: You can specify the character limit as per your requirement.

image-20210527-174117.png

If the file already has [kv] stanza then just add the maxchars = 2500000 line in that stanza to increase the character limit to 2500000 characters.

Important Note: Restart Splunk to make these changes into effect.