Splunk clean eventdata -index _fishbucket. A Splunk instance is used in the software Splunk. This software is used to analyze, search, and monitor data. These processes are done through a Web interface. A Splunk instance gets data from a forwarder and then writes this data to a disk.
These instances can work as standalone and with other indexers. Splunk instances can also work as a search interface. One many see the term in documents, used to distinguish from a forwarder. There are many Splunk instances, which include indexers, deployment servers, search heads, and heavy forwarders.
Although you can add new types to a type, you can't add new analyzers to make changes to existing fields. If you were to do so, the information that had already been indexed would be erroneous and your inquiries would no longer work as anticipated.
The easiest way to relate these changes to your existing statistics is to reindex. Make a new index with the new settings and copy all your documents from the old index to the new one. To reindex all the records from the old index, and then push them into the new index.