<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about inputs.conf [monitor:///...] in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680030#M113618</link>
    <description>&lt;P&gt;Hi there.&lt;/P&gt;&lt;P&gt;A simple question, it's not for a real usage, just a curiosity &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does UF block inputs for &lt;U&gt;&lt;STRONG&gt;system paths&lt;/STRONG&gt; &lt;/U&gt;by default?&lt;/P&gt;&lt;P&gt;An example, teorically an inputs like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor:///...]
whitelist=.
index=root
sourcetype=root_all
disabled=0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should ingest all non binary files under the "/" paths, including subdirs.&lt;/P&gt;&lt;P&gt;At the real fact, i find only the "/boot" path ingested.&lt;/P&gt;&lt;P&gt;Is this a security feature to exclude system paths "/" from been ingested?&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2024 07:57:19 GMT</pubDate>
    <dc:creator>verbal_666</dc:creator>
    <dc:date>2024-03-08T07:57:19Z</dc:date>
    <item>
      <title>Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680030#M113618</link>
      <description>&lt;P&gt;Hi there.&lt;/P&gt;&lt;P&gt;A simple question, it's not for a real usage, just a curiosity &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does UF block inputs for &lt;U&gt;&lt;STRONG&gt;system paths&lt;/STRONG&gt; &lt;/U&gt;by default?&lt;/P&gt;&lt;P&gt;An example, teorically an inputs like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor:///...]
whitelist=.
index=root
sourcetype=root_all
disabled=0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should ingest all non binary files under the "/" paths, including subdirs.&lt;/P&gt;&lt;P&gt;At the real fact, i find only the "/boot" path ingested.&lt;/P&gt;&lt;P&gt;Is this a security feature to exclude system paths "/" from been ingested?&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 07:57:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680030#M113618</guid>
      <dc:creator>verbal_666</dc:creator>
      <dc:date>2024-03-08T07:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680034#M113620</link>
      <description>&lt;P&gt;I shouldn't think so. I'd expect it rather to be a permissions/SELinux issue or something like that.&lt;/P&gt;&lt;P&gt;Do&lt;/P&gt;&lt;PRE&gt;splunk list monitor&lt;/PRE&gt;&lt;P&gt;and&lt;/P&gt;&lt;PRE&gt;splunk inputstatus&lt;/PRE&gt;</description>
      <pubDate>Fri, 08 Mar 2024 08:15:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680034#M113620</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-08T08:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680036#M113621</link>
      <description>&lt;P&gt;Already done, System Paths are monitored, but no file is ingested &lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I think this is a security feature to exclude direct access to "/" &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Monitored Directories:
        /...
                /.autorelabel
                /afs
                /bin
                /boot
                /boot/.vmlinuz-5.14.0-284.11.1.el9_2.x86_64.hmac
                /boot/.vmlinuz-5.14.0-284.30.1.el9_2.x86_64.hmac
                /boot/config-5.14.0-284.11.1.el9_2.x86_64
                /boot/config-5.14.0-284.30.1.el9_2.x86_64
                /boot/efi
                /boot/grub2
                /boot/initramfs-0-rescue-d264ca908f764f5191a3c479f3e6f4bc.img
                /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64.img
                /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img
                /boot/initramfs-5.14.0-284.30.1.el9_2.x86_64.img
                /boot/initramfs-5.14.0-284.30.1.el9_2.x86_64kdump.img
                /boot/loader
                /boot/symvers-5.14.0-284.11.1.el9_2.x86_64.gz
                /boot/symvers-5.14.0-284.30.1.el9_2.x86_64.gz
                /boot/System.map-5.14.0-284.11.1.el9_2.x86_64
                /boot/System.map-5.14.0-284.30.1.el9_2.x86_64
                /boot/vmlinuz-0-rescue-d264ca908f764f5191a3c479f3e6f4bc
                /boot/vmlinuz-5.14.0-284.11.1.el9_2.x86_64
                /boot/vmlinuz-5.14.0-284.30.1.el9_2.x86_64
                /dev
                /dev/almalinux
                /dev/block
                /dev/bsg
                /dev/cdrom
                /dev/char
                /dev/core
                /dev/cpu
                /dev/disk
                /dev/dma_heap
                /dev/dri
                /dev/fd
                /dev/hugepages
                /dev/initctl
                /dev/input
                /dev/log
                /dev/mapper
                /dev/mqueue
                /dev/net
                /dev/pts
                /dev/rtc
                /dev/shm
                /dev/snd
                /dev/stderr
                /dev/stdin
                /dev/stdout
                /dev/vfio
                /etc
                /home
                /lib
                /lib64
                /media
                /mnt
                /proc
                /proc/acpi
                /proc/bus
                /proc/dma
                /proc/fb
                /proc/fs
                /proc/irq
                /proc/keys
                /proc/kmsg
                /proc/net
                /proc/sys
                /proc/tty
                /root
                /run
                /sbin
                /srv
                /sys
                /This_is_Just_A_Test
                /usr&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This can be also guessed by "&lt;STRONG&gt;/This_is_Just_A_Test&lt;/STRONG&gt;" path, which contains many .txt files.&lt;/P&gt;&lt;P&gt;With "&lt;STRONG&gt;/...&lt;/STRONG&gt;" they are skipped, with explicit,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor:///This_is_Just_A_Test]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are ingested &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I really think it's a security feature to prevent "/" to be fully accessed.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 08:30:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680036#M113621</guid>
      <dc:creator>verbal_666</dc:creator>
      <dc:date>2024-03-08T08:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680144#M113633</link>
      <description>&lt;P&gt;I did a test on my local UF.&lt;/P&gt;&lt;P&gt;It resulted with:&lt;/P&gt;&lt;P&gt;1) splunkd process opening hundreds of files (verifiable by "ls -la /proc/&amp;lt;splunk_pid&amp;gt;/fd")&lt;/P&gt;&lt;P&gt;2) Huge number of entries like:&lt;/P&gt;&lt;PRE&gt;03-09-2024 09:34:05.449 +0100 WARN FileClassifierManager [7610 tailreader0] - The file '/usr/bin/mariadb-import' is invalid. Reason: binary.&lt;BR /&gt;03-09-2024 09:34:05.449 +0100 INFO TailReader [7610 tailreader0] - Ignoring file '/usr/bin/mariadb-import' due to: binary&lt;/PRE&gt;&lt;P&gt;In splunkd.log&lt;/P&gt;&lt;P&gt;So splunkd is trying to read the files but doesn't ingest them due to the files being binary and then apparently gives up due to exhausting opened FDs limit (default - 100).&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2024 08:40:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680144#M113633</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-09T08:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680206#M113656</link>
      <description>&lt;LI-CODE lang="markup"&gt;WARN .... Reason: binary.&lt;/LI-CODE&gt;&lt;P&gt;Should be right, since no binary is grant in props and by default is set to not get access to binaries.&lt;/P&gt;&lt;P&gt;Descriptors to 100 is default, and it's ok, but should progress anyway. And in splunkd.log i can't see any WARN about descriptors.&lt;/P&gt;&lt;P&gt;Now, why the "&lt;STRONG&gt;/etc&lt;/STRONG&gt;" with all its ascii system files are not ingested since it's before the "&lt;STRONG&gt;/usr&lt;/STRONG&gt;"?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2024 14:14:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680206#M113656</guid>
      <dc:creator>verbal_666</dc:creator>
      <dc:date>2024-03-10T14:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680211#M113657</link>
      <description>&lt;P&gt;The thing is that the file is being opened and is held open in case it's getting truncated and rewritten with textual contents. So the 100 fd limit is exhausted quickly.&lt;/P&gt;&lt;P&gt;About the order - I suppose either /bin is first (which in case of my Fedora is just a symlink to /usr/bin) or the order is the disk order not the alphabetical one.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2024 20:27:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680211#M113657</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-10T20:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Question about inputs.conf [monitor:///...]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680231#M113660</link>
      <description>&lt;P&gt;I think it's a right &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;analysis&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Maybe, just for some tests &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;i'll try playing with "&lt;EM&gt;max_fd&lt;/EM&gt;" in limits to see how System works.&lt;/P&gt;&lt;P&gt;Just to stress the System &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt; as said in first post, it's only a test to understand better UF. I just saw how dangerous, sometimes, is to introduce the "..." or "*" or any other wildcard in &lt;U&gt;path inputs&lt;/U&gt;, since UF could get crazy 🤷‍&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt;like crcSalt, which could ingest x2/x3/x4/... data if not right blacklisted (think about log rotation with maybe gz/zip/bz extensions 🤷‍&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt; ).&lt;/P&gt;&lt;P&gt;Anyway, there's something else than only fd. In a stable environment, UF should "leave free" the file (and drop its fd) after "time_before_close" (5 by default), so can process other files in queue. Another strange situation, i can't see any WARN about &lt;U&gt;&lt;STRONG&gt;fd&lt;/STRONG&gt; &lt;/U&gt;in splunkd.log, as sometimes i saw in other situations &lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;log explicitly said the max_fd was raised &lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;now not! Strange!&lt;/P&gt;&lt;P&gt;Maybe this behaviour occurs different on different distros, as should be a System problem, not directly related to UF work 🤷‍&lt;span class="lia-unicode-emoji" title=":male_sign:"&gt;♂️&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 04:42:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Question-about-inputs-conf-monitor/m-p/680231#M113660</guid>
      <dc:creator>verbal_666</dc:creator>
      <dc:date>2024-03-11T04:42:59Z</dc:date>
    </item>
  </channel>
</rss>

