<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SPLUNK update existing events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111265#M183627</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;

&lt;P&gt;I have a case like below:&lt;/P&gt;

&lt;P&gt;I have events with &lt;CODE&gt;order_id, order_status, ord_creation_date&lt;/CODE&gt; being indexed for almost 2 months before the user asked me to add more columns to be displayed; &lt;CODE&gt;ord_completed_date, created_by&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;So I add the extra columns easily but leaving the 2 months data without any value of the new columns. As I understand in any DB stacks we can do UPDATE statement to fill the new column with values, how can I do the same in SPLUNK?&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jul 2015 11:07:12 GMT</pubDate>
    <dc:creator>imanpoeiri</dc:creator>
    <dc:date>2015-07-09T11:07:12Z</dc:date>
    <item>
      <title>SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111265#M183627</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;

&lt;P&gt;I have a case like below:&lt;/P&gt;

&lt;P&gt;I have events with &lt;CODE&gt;order_id, order_status, ord_creation_date&lt;/CODE&gt; being indexed for almost 2 months before the user asked me to add more columns to be displayed; &lt;CODE&gt;ord_completed_date, created_by&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;So I add the extra columns easily but leaving the 2 months data without any value of the new columns. As I understand in any DB stacks we can do UPDATE statement to fill the new column with values, how can I do the same in SPLUNK?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 11:07:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111265#M183627</guid>
      <dc:creator>imanpoeiri</dc:creator>
      <dc:date>2015-07-09T11:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111266#M183628</link>
      <description>&lt;P&gt;Once data has been indexed (or consumed) by Splunk, you cannot change it. If you have the data, you could do an export all of the data, add the columns in vi/notepad/excel/whatever, and re-index the data.  Splunk is a NOSQL "database", so there isn't any update you can perform on the already indexed data.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 11:46:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111266#M183628</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2015-07-09T11:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111267#M183629</link>
      <description>&lt;P&gt;Splunk is not a database.  You can't update events in Splunk.  The only change you can make is to mark events for deletion.&lt;/P&gt;

&lt;P&gt;However, if you still have the original data from the past 2 months, you can delete the existing events and re-index them to include the new fields.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 11:51:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111267#M183629</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2015-07-09T11:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111268#M183630</link>
      <description>&lt;P&gt;Hi @alacercogitatus,&lt;/P&gt;

&lt;P&gt;Now the other problem is, the estimated file size for the 2 months data is around 2GB. Would you have any suggestion what tools I can use to perform bulk updates?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2015 03:06:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111268#M183630</guid>
      <dc:creator>imanpoeiri</dc:creator>
      <dc:date>2015-07-10T03:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111269#M183631</link>
      <description>&lt;P&gt;I can get from your statement that onces data is indexed we cant update it. What if i can enter a new row with the updated data and then can display latest data in splunk form? just wanted to understand how can we do that dynamically from splunk form&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 07:04:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111269#M183631</guid>
      <dc:creator>vikashperiwal</dc:creator>
      <dc:date>2017-05-17T07:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK update existing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111270#M183632</link>
      <description>&lt;P&gt;and to add to prev comment i will need the historic data aswell ..so i cant delete the prev data&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 07:05:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPLUNK-update-existing-events/m-p/111270#M183632</guid>
      <dc:creator>vikashperiwal</dc:creator>
      <dc:date>2017-05-17T07:05:02Z</dc:date>
    </item>
  </channel>
</rss>

