Getting Data In

Re-index after changing props.conf?

howyagoin
Contributor

Yesterday afternoon I updated a number of files which had missing data in them in a directory which Splunk's tailing processor was monitoring. Before updating the files, I did a query for the specific source files and |'d through delete.

After updating the files, the timestamps are not being read correctly and everything is attributed to yesterday's re-reading time:

5/3/11
12:52:25.000 PM INFO 2011-04-18 17:44

I thought I'd try to fix this by updating props.conf with:

[source::/A/B/c/dirwithfiles]
TIME_PREFIX = INFO\s
TIME_FORMAT = %Y-%m-%d %H:%m

Which I believe should be correct, but, the data is still incorrectly timestamped when I query -- I have the bad feeling, and am thus looking for confirmation here, that I have to remove and re-index everything for the props.conf to be read correctly.

Yes?

Or is there another way, a better way, a Splunktastic way?

Tags (2)
0 Karma
1 Solution

Ayn
Legend

Timestamp parsing applies as Splunk indexes new data, so any changes you make to that in props.conf will not affect data that has already been indexed. So, in order to get your timestamps right, you will indeed need to reindex your data after making your changes to props.conf (and restarting Splunk in order to activate these changes).

View solution in original post

Ayn
Legend

Timestamp parsing applies as Splunk indexes new data, so any changes you make to that in props.conf will not affect data that has already been indexed. So, in order to get your timestamps right, you will indeed need to reindex your data after making your changes to props.conf (and restarting Splunk in order to activate these changes).

howyagoin
Contributor

Thanks. I was afraid of that. I tried it on a few files and that seemed to be the result, but I was hoping to avoid the hassle and be told of a quicker way around it (and a way less likely to trip license issues given the amount of data...

0 Karma

howyagoin
Contributor

I should mention that after the timestamp is the rest of the line with useful data that I'm searching for, I just did not include that here.

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...