<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I configure Splunk to properly index my file in production? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284838#M54408</link>
    <description>&lt;P&gt;That search returned no results.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Sep 2016 21:56:37 GMT</pubDate>
    <dc:creator>chrisduimstra</dc:creator>
    <dc:date>2016-09-14T21:56:37Z</dc:date>
    <item>
      <title>How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284836#M54406</link>
      <description>&lt;P&gt;I have a file in production that appears to not be indexed as running a search for &lt;CODE&gt;index=&amp;lt;name&amp;gt;&lt;/CODE&gt; returns no results. The file has no header and has the following field format.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2016-04-05 02:51:05.4457|Error|Error receiving response: Connection timeout
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I have tested this file on my locally installed instance by replacing the first pipe with a space as to isolate the time field as such.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2016-04-05 02:51:05.4457 Error|Error receiving response: Connection timeout
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This worked on my local instance. However, I am unable to modify the production file. Is there a way to mimic this change through settings to work on the production file?&lt;/P&gt;

&lt;P&gt;EDIT:&lt;BR /&gt;
I created a new .txt file and copied a couple logs over to the new file. I then added another stanza to monitor that file, and the new file was indexed but not the old. I have tried .txt and .log suffixes. Here is the current &lt;CODE&gt;inputs.conf&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor://C:\Program Files (x86)\Sell\LPClient.txt]
index = LP
sourcetype = LPClient_log
disabled = 0

[monitor://C:\Program Files (x86)\Sell\NewTextDocument.txt]
index = LP
sourcetype = LPClient_log
disabled = 0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Sep 2016 21:39:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284836#M54406</guid>
      <dc:creator>chrisduimstra</dc:creator>
      <dc:date>2016-09-14T21:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284837#M54407</link>
      <description>&lt;P&gt;Try running &lt;CODE&gt;index=_internal sourcetype=splunkd host=&amp;lt;hostname&amp;gt; *&amp;lt;filename&amp;gt;*&lt;/CODE&gt; and see what is returned. &lt;/P&gt;

&lt;P&gt;You might see something like this: &lt;CODE&gt;09-14-2016 21:50:06.008 +0000 INFO  TailingProcessor - Ignoring file '/var/log/folder/file.log' due to: binary&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 21:52:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284837#M54407</guid>
      <dc:creator>ShaneNewman</dc:creator>
      <dc:date>2016-09-14T21:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284838#M54408</link>
      <description>&lt;P&gt;That search returned no results.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 21:56:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284838#M54408</guid>
      <dc:creator>chrisduimstra</dc:creator>
      <dc:date>2016-09-14T21:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284839#M54409</link>
      <description>&lt;P&gt;A few things:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Your timestamp has no timezone. Your log could be interpreted either in the past, or out in the future depending on how the indexer's timezone is set. Or how the TZ is set in props.conf for this source(type). I would expand my search time frame to include at least 24 hours on either side of the expected.&lt;/LI&gt;
&lt;LI&gt;Along those same lines, I can't tell for sure from your timestamp if it's %Y-%m-%d or %Y-%d-%m. Be sure your props.conf explicitly sets your TIME_FORMAT properly for this source(type).&lt;/LI&gt;
&lt;LI&gt;Your timestamp is far in the past. Splunk has a setting to ignore events older than specified time period. I would check the MAX_DAYS_AGO setting on the indexer to be sure it isn't so low as to exclude these events. (Default is 2000, but worth checking anyway.)&lt;/LI&gt;
&lt;LI&gt;EDIT: I don't think the inclusion exclusion of the pipe is making any difference to parsing.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:01:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284839#M54409</guid>
      <dc:creator>twinspop</dc:creator>
      <dc:date>2020-09-29T11:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284840#M54410</link>
      <description>&lt;UL&gt;
&lt;LI&gt;My search is running over all time.&lt;/LI&gt;
&lt;LI&gt;I set &lt;CODE&gt;TIME_FORMAT = %Y-%m-%d&lt;/CODE&gt; in props.conf for the source&lt;/LI&gt;
&lt;LI&gt;As for the timestamp I listed, that was from the beginning of the log, the latest entry was from yesterday.
My search is still returning, no results found.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 14 Sep 2016 23:13:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284840#M54410</guid>
      <dc:creator>chrisduimstra</dc:creator>
      <dc:date>2016-09-14T23:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: How can I configure Splunk to properly index my file in production?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284841#M54411</link>
      <description>&lt;P&gt;Hi, please look at your original question &lt;A href="https://answers.splunk.com/answers/451910/how-to-monitor-a-single-file-to-be-indexed-by-modi.html"&gt;https://answers.splunk.com/answers/451910/how-to-monitor-a-single-file-to-be-indexed-by-modi.html&lt;/A&gt; for additional hints &amp;amp; tips &lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 01:26:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-can-I-configure-Splunk-to-properly-index-my-file-in/m-p/284841#M54411</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2016-09-15T01:26:50Z</dc:date>
    </item>
  </channel>
</rss>

