<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: monitoring text based log file on windows in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52932#M10209</link>
    <description>&lt;P&gt;If you didn't change the default credentials to anything else, the ones you should use are "admin" as username and "changeme" as password.&lt;/P&gt;</description>
    <pubDate>Wed, 16 May 2012 12:14:16 GMT</pubDate>
    <dc:creator>Ayn</dc:creator>
    <dc:date>2012-05-16T12:14:16Z</dc:date>
    <item>
      <title>monitoring text based log file on windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52931#M10208</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have following input.conf in an app on my deployment server&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[Monitor://%product_home%\logs\stdout.log]
disabled=0
followtail=0
sourcetype=product_stdout
index=product_logs
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The app deploys to the target server fine, and i also have a forwarding app which also deploys fine (I am also monitoring windows event logs, and these appear in the index no problem, so I know both this and the forwarding app work correctly)&lt;/P&gt;

&lt;P&gt;However, my stdout.log doesn't seem to be making it into the product_logs index (the index does exist)&lt;/P&gt;

&lt;P&gt;I have seen mention of accessing&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;A href="https://localhost:8089/services/admin/inputStatus/TailingProcessor%3AFileStatus"&gt;https://localhost:8089/services/admin/inputStatus/TailingProcessor%3AFileStatus&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;on the target server, but I get prompted with a login box with no idea what credentials to enter in. likewise if i run the equivalent request from the command line, i get prompted to enter a username and password. after it fails i get a 401 unauthorized error.&lt;/P&gt;

&lt;P&gt;I have tried various combinations ...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[Monitor://$product_home\logs\stdout.log]
[Monitor://c:\really long path\in here\logs\stdout.log]
[Monitor://%product_home%\logs\stdout.log]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To no avail.&lt;/P&gt;

&lt;P&gt;stdout.log does exist and has content, there are no special permissions on the file and the Splunk agent is running as local system&lt;/P&gt;

&lt;P&gt;%PRODUCT_HOME% is defined on the target server as a system environment variable, and is in use by other programs, so I know the path is valid.&lt;/P&gt;

&lt;P&gt;The splunkd.log  doesn't appear to have anything useful to tell me other than the app deployed ok.&lt;/P&gt;

&lt;P&gt;I am sure this must be something incredibly simple that I am missing, but I can't see it for the conf.&lt;/P&gt;

&lt;P&gt;Halp?&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2012 09:31:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52931#M10208</guid>
      <dc:creator>Conradj</dc:creator>
      <dc:date>2012-05-16T09:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring text based log file on windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52932#M10209</link>
      <description>&lt;P&gt;If you didn't change the default credentials to anything else, the ones you should use are "admin" as username and "changeme" as password.&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2012 12:14:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52932#M10209</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-05-16T12:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring text based log file on windows</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52933#M10210</link>
      <description>&lt;P&gt;Some ideas:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Search for something that you &lt;EM&gt;know&lt;/EM&gt; is in the data over &lt;STRONG&gt;all time&lt;/STRONG&gt;. Perhaps there is a timestamp problem, and the data is really in there, but not at the time you expect.&lt;/LI&gt;
&lt;LI&gt;Search index=* for that data. It shouldn't have happened, but what the heck.&lt;/LI&gt;
&lt;LI&gt;Is the data recent? If it is older, or has widely varying timestamps, you may need to set some rules in props.conf. Put them in props.conf on the indexer if you are using the Universal Forwarder. Look at the settings for &lt;CODE&gt;MAX_DAYS_AGO&lt;/CODE&gt;, &lt;CODE&gt;MAX_DAYS_HENCE&lt;/CODE&gt;, &lt;CODE&gt;MAX_DIFF_SECS_AGO&lt;/CODE&gt; and &lt;CODE&gt;MAX_DIFF_SECS_HENCE&lt;/CODE&gt; in &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Propsconf"&gt;props.conf&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 16 May 2012 18:14:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/monitoring-text-based-log-file-on-windows/m-p/52933#M10210</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-05-16T18:14:46Z</dc:date>
    </item>
  </channel>
</rss>

