<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Indexers props.conf in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/437998#M99347</link>
    <description>&lt;P&gt;From Splunk it's said it's best to do your custom Field extractions at search time. So the only extractions you do on your indexers are date/time field extractions and what else?&lt;/P&gt;

&lt;P&gt;Can someone provide me a well written, efficient props.conf file for your index time extractions for IIS or Tomcat sourcetype logs?&lt;/P&gt;

&lt;P&gt;I'm pulling in HUGE iis logs from about 40 servers many logs larger that 1gb in size and we are noticing a delay of up to 2+ hours for those logs. I understand increasing pipelines on indexer or UFs, I also understand upping the maxkb limit in limits.conf&lt;/P&gt;

&lt;P&gt;My purpose here is to determine if there's a more efficient way to get my data in via the configurations files. Am I doing something wrong or neglecting the best practices?&lt;/P&gt;

&lt;P&gt;On my indexers props.conf&lt;BR /&gt;
I have the timezone set to UTC and that's it. All my custom Field extractions are on my search heads via props and transforms.  I'd imagine there's more i can do to help out my indexer via props.conf&lt;/P&gt;

&lt;P&gt;Can someone provide an example and explain the key value pairs within their stanza. Thanks&lt;/P&gt;</description>
    <pubDate>Sat, 10 Aug 2019 11:45:36 GMT</pubDate>
    <dc:creator>Jarohnimo</dc:creator>
    <dc:date>2019-08-10T11:45:36Z</dc:date>
    <item>
      <title>Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/437998#M99347</link>
      <description>&lt;P&gt;From Splunk it's said it's best to do your custom Field extractions at search time. So the only extractions you do on your indexers are date/time field extractions and what else?&lt;/P&gt;

&lt;P&gt;Can someone provide me a well written, efficient props.conf file for your index time extractions for IIS or Tomcat sourcetype logs?&lt;/P&gt;

&lt;P&gt;I'm pulling in HUGE iis logs from about 40 servers many logs larger that 1gb in size and we are noticing a delay of up to 2+ hours for those logs. I understand increasing pipelines on indexer or UFs, I also understand upping the maxkb limit in limits.conf&lt;/P&gt;

&lt;P&gt;My purpose here is to determine if there's a more efficient way to get my data in via the configurations files. Am I doing something wrong or neglecting the best practices?&lt;/P&gt;

&lt;P&gt;On my indexers props.conf&lt;BR /&gt;
I have the timezone set to UTC and that's it. All my custom Field extractions are on my search heads via props and transforms.  I'd imagine there's more i can do to help out my indexer via props.conf&lt;/P&gt;

&lt;P&gt;Can someone provide an example and explain the key value pairs within their stanza. Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 10 Aug 2019 11:45:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/437998#M99347</guid>
      <dc:creator>Jarohnimo</dc:creator>
      <dc:date>2019-08-10T11:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/437999#M99348</link>
      <description>&lt;P&gt;Hey @Jarohnimo,&lt;/P&gt;

&lt;P&gt;Best way to find well written props.conf for any data source is to find the splunk built TA. Have a look here for IIS &lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/3185/"&gt;https://splunkbase.splunk.com/app/3185/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;And here for Tomcat:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/2911/"&gt;https://splunkbase.splunk.com/app/2911/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can grab the app and take the props.conf from there.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Sat, 10 Aug 2019 13:00:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/437999#M99348</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-08-10T13:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438000#M99349</link>
      <description>&lt;P&gt;Thanks David, I have these currently set on my search heads but curious as to what makes sense to add explicitly to time date / parsing that may improve indexing.&lt;/P&gt;

&lt;P&gt;Generally I don't want the entire app on my indexer as that will add to index time (slow resources)&lt;/P&gt;

&lt;P&gt;Is setting the time zone all I need to do for these source types? There's a lot of options for time date field parsing&lt;/P&gt;</description>
      <pubDate>Sat, 10 Aug 2019 17:57:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438000#M99349</guid>
      <dc:creator>Jarohnimo</dc:creator>
      <dc:date>2019-08-10T17:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438001#M99350</link>
      <description>&lt;P&gt;For example, I'm pulling huge logs. And I read that due to the large log set event processing can be clogged on the forwarders. &lt;/P&gt;

&lt;P&gt;I saw this bit in an article I was reading&lt;/P&gt;

&lt;P&gt;For optimal performance of your data, you can set the following settings for your sourcetype in props.conf:&lt;/P&gt;

&lt;P&gt;DATETIME_CONFIG&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD&lt;BR /&gt;
TIME_PREFIX&lt;BR /&gt;
TIME_FORMAT&lt;BR /&gt;
SHOULD_LINEMERGE&lt;BR /&gt;
ANNOTATE_PUNCT&lt;/P&gt;

&lt;P&gt;Should I be doing this on the inexers?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:40:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438001#M99350</guid>
      <dc:creator>Jarohnimo</dc:creator>
      <dc:date>2020-09-30T01:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438002#M99351</link>
      <description>&lt;P&gt;Yes! Exactly. &lt;BR /&gt;
Those settings are referred to as the magic 6 and should be configured  for all your sourcetypes. &lt;/P&gt;

&lt;P&gt;So yeah make sure you have the six of them in props.conf and drop all the search time configs : TIME_PREFIX, TIME_FORMAT, MAX_TIMESTAMP_LOOKAHEAD, SHOULD_LINEMERGE, LINE_BREAKER and TRUNCATE.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:42:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438002#M99351</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2020-09-30T01:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Indexers props.conf</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438003#M99352</link>
      <description>&lt;P&gt;@jarohnimo, do you need any more help on this issue ? If not could you please accept the answer to close it down ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 07:01:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexers-props-conf/m-p/438003#M99352</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-08-14T07:01:59Z</dc:date>
    </item>
  </channel>
</rss>

