Getting Data In

which props files in splunk do not require restarting splunk?

alexl1
Path Finder

hi, when making changes to props files, which props files in splunk do not require restarting splunk and take effect on the fly? thanks,

Tags (1)
0 Karma
1 Solution

ChrisG
Splunk Employee
Splunk Employee

Are you asking about props.conf in particular, or configuration files in general? Changes to props.conf almost always require a restart, see this previous Answers posting.

For a more general answer, see this Answers posting.

You should read the topics about configuration files in the Admin Manual, particularly the topic on configuration file precedence.

View solution in original post

ChrisG
Splunk Employee
Splunk Employee

Are you asking about props.conf in particular, or configuration files in general? Changes to props.conf almost always require a restart, see this previous Answers posting.

For a more general answer, see this Answers posting.

You should read the topics about configuration files in the Admin Manual, particularly the topic on configuration file precedence.

ChrisG
Splunk Employee
Splunk Employee

No, you would never be. But, if you--hypothetically--were, I would admire you for it.

0 Karma

Drainy
Champion

Not to be picky of course 🙂

0 Karma

ChrisG
Splunk Employee
Splunk Employee

Thanks for the refinement, Drainy. 🙂 I appreciate it the correction!

Drainy
Champion

I'd disagree that they almost always require a restart, as Ayn posted below, anything search time related takes effect immediately as this part of the props is reloaded each time Splunkd forks off a new process to handle a search.

alacercogitatus
SplunkTrust
SplunkTrust

It's more about the settings that are changed, then the files themselves. Search-Time properties (EXTRACT, REPORT, FIELDALIAS, etc) are done "on the fly". Index-time properties (TRANSFORMS, LINE_BREAKER, parsing items, etc) need restarts. When in doubt, wait no more than 10 minutes, and then restart.

Ayn
Legend

It's not a matter of which file the settings are in - Splunk reads settings from all props.conf files and merges them. Rather it's a matter of which specific settings. The general rule is that all settings affecting index-time behaviour (event breaking, timestamp parsing, etc) require a restart whereas all search-time settings (field extractions, lookups...) do not.

alexl1
Path Finder

thanks xxx

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...