Getting Data In

Re-index after changing props.conf?

howyagoin
Contributor

Yesterday afternoon I updated a number of files which had missing data in them in a directory which Splunk's tailing processor was monitoring. Before updating the files, I did a query for the specific source files and |'d through delete.

After updating the files, the timestamps are not being read correctly and everything is attributed to yesterday's re-reading time:

5/3/11
12:52:25.000 PM INFO 2011-04-18 17:44

I thought I'd try to fix this by updating props.conf with:

[source::/A/B/c/dirwithfiles]
TIME_PREFIX = INFO\s
TIME_FORMAT = %Y-%m-%d %H:%m

Which I believe should be correct, but, the data is still incorrectly timestamped when I query -- I have the bad feeling, and am thus looking for confirmation here, that I have to remove and re-index everything for the props.conf to be read correctly.

Yes?

Or is there another way, a better way, a Splunktastic way?

Tags (2)
0 Karma
1 Solution

Ayn
Legend

Timestamp parsing applies as Splunk indexes new data, so any changes you make to that in props.conf will not affect data that has already been indexed. So, in order to get your timestamps right, you will indeed need to reindex your data after making your changes to props.conf (and restarting Splunk in order to activate these changes).

View solution in original post

Ayn
Legend

Timestamp parsing applies as Splunk indexes new data, so any changes you make to that in props.conf will not affect data that has already been indexed. So, in order to get your timestamps right, you will indeed need to reindex your data after making your changes to props.conf (and restarting Splunk in order to activate these changes).

howyagoin
Contributor

Thanks. I was afraid of that. I tried it on a few files and that seemed to be the result, but I was hoping to avoid the hassle and be told of a quicker way around it (and a way less likely to trip license issues given the amount of data...

0 Karma

howyagoin
Contributor

I should mention that after the timestamp is the rest of the line with useful data that I'm searching for, I just did not include that here.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...