<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring log files reused in a ring? in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18666#M117</link>
    <description>&lt;P&gt;Possible. Windows log sources are ... notorious for not updating the modtime of the file. It's seen a lot in IIS installations.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Mar 2013 21:52:11 GMT</pubDate>
    <dc:creator>sowings</dc:creator>
    <dc:date>2013-03-22T21:52:11Z</dc:date>
    <item>
      <title>Monitoring log files reused in a ring?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18664#M115</link>
      <description>&lt;P&gt;I have a log source which re-uses the same log file based upon the day of the month. A filename contains other information, but that information doesn't change. Here is a sample: &lt;CODE&gt;10_40809_(IRL_Lab_Live).log&lt;/CODE&gt;. That filename represents log data written on the 10th of October. Next month, it will be truncated, starting again from an empty file, but still the same filename. I've got a standard &lt;CODE&gt;[monitor:...]&lt;/CODE&gt; style inputs.conf stanza monitoring the directory containing these files.&lt;/P&gt;

&lt;P&gt;It seems that I have to occasionally jiggle Splunk's elbow (restart) to get it to index "today's" data. Is there some other trick to get Splunk to index this smoothly? It doesn't sound like a candidate for &lt;CODE&gt;alwaysOpenFile&lt;/CODE&gt;, but I could try that setting if it would help.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2012 18:15:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18664#M115</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-10-31T18:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring log files reused in a ring?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18665#M116</link>
      <description>&lt;P&gt;I discovered that if we removed the ignoreOlderThan filter on the inputs and just ate the bullet on indexing all of that data that it will work fine. For whatever reason I guess that the filter was looking at the original file time?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2013 21:50:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18665#M116</guid>
      <dc:creator>ShaneNewman</dc:creator>
      <dc:date>2013-03-22T21:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring log files reused in a ring?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18666#M117</link>
      <description>&lt;P&gt;Possible. Windows log sources are ... notorious for not updating the modtime of the file. It's seen a lot in IIS installations.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2013 21:52:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Monitoring-log-files-reused-in-a-ring/m-p/18666#M117</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2013-03-22T21:52:11Z</dc:date>
    </item>
  </channel>
</rss>

