<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: duplicated events when monitoring from log file in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19342#M2738</link>
    <description>&lt;P&gt;I've just noticed that when enabled tailing, some events are truncated off..&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jul 2010 15:38:30 GMT</pubDate>
    <dc:creator>remy06</dc:creator>
    <dc:date>2010-07-26T15:38:30Z</dc:date>
    <item>
      <title>duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19337#M2733</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have a script that pulls oracle events and write them to a file called ora.log.The script runs at 5 min interval.&lt;/P&gt;

&lt;P&gt;After which I've configured splunk to monitor that file as data input.Currently I've noticed there are some duplication of events when i do a search..&lt;/P&gt;

&lt;P&gt;How do I configure splunk to indexed only the new events after subsequent runs?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2010 14:47:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19337#M2733</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-07-23T14:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19338#M2734</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;

&lt;P&gt;when you integrate or uploaded logfiles from a directory as a new data input, you can specify a setting for this data input via the Splunk Management UI.&lt;/P&gt;

&lt;P&gt;Set the flag for the setting Follow Tail.&lt;/P&gt;

&lt;P&gt;When you want to modify this setting in the inputs.conf file, just add following line to the file:&lt;/P&gt;

&lt;P&gt;followTail = 1&lt;/P&gt;

&lt;P&gt;That tells Splunk only to read out the new events from logfiles.&lt;/P&gt;

&lt;P&gt;Hope that's what you are looking for!&lt;/P&gt;

&lt;P&gt;Cheers,&lt;/P&gt;

&lt;P&gt;Christian&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2010 20:49:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19338#M2734</guid>
      <dc:creator>simuvid</dc:creator>
      <dc:date>2010-07-23T20:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19339#M2735</link>
      <description>&lt;P&gt;Is it really only that some events that are duplicated, or is the entire file getting re-indexed each time the script updates the log?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2010 22:18:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19339#M2735</guid>
      <dc:creator>Jeremiah</dc:creator>
      <dc:date>2010-07-23T22:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19340#M2736</link>
      <description>&lt;P&gt;some events are being duplicated,not the entire file as I've taken a look at the actual ora.log file.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2010 11:02:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19340#M2736</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-07-26T11:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19341#M2737</link>
      <description>&lt;P&gt;I've tried.Frequency of duplicate events seem to have reduced a little, but still the problem exist. Is it a bug?Or a configuration issue?&lt;/P&gt;

&lt;P&gt;Also by using this method,earlier events in the file does not get indexed as monitoring starts at the end of the file..&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2010 15:27:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19341#M2737</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-07-26T15:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19342#M2738</link>
      <description>&lt;P&gt;I've just noticed that when enabled tailing, some events are truncated off..&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2010 15:38:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19342#M2738</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-07-26T15:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19343#M2739</link>
      <description>&lt;P&gt;I've got the same problem here.  I download a log file to a temporary directory every 5 minutes, then move it into the log file directory I've specified in Splunk, overwriting the previous log.&lt;/P&gt;

&lt;P&gt;However, many events are duplicated in the index.  For example, one log with 8859 lines ended up as 154,130 events in the index.  Adding it manually via the "add oneshot" command produces the correct number of events.&lt;/P&gt;

&lt;P&gt;I've confirmed that the events are listed only once in the log files themselves.  I've got followTail = 1 set in inputs.conf.  I've also got crcSalt =  set, if that's somehow related.&lt;/P&gt;

&lt;P&gt;Is there something off with the way Splunk handles tailing log files, or is there a config change needed here?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2010 09:08:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19343#M2739</guid>
      <dc:creator>chjpcert</dc:creator>
      <dc:date>2010-07-27T09:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19344#M2740</link>
      <description>&lt;P&gt;Hi remy06,&lt;/P&gt;

&lt;P&gt;the ora.log file has it something like a timestamp in the filename, or something else that changes the filename after adding new entries into it?&lt;BR /&gt;
Or do you have any kind of header in the logfile?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2010 14:30:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19344#M2740</guid>
      <dc:creator>simuvid</dc:creator>
      <dc:date>2010-07-28T14:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19345#M2741</link>
      <description>&lt;P&gt;Am not sure if its related to known issue (SPL-23555) where "monitor inputs using the followTail setting sometimes will index some older events or all events from log files which are updated when not intended." ?.....&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2010 14:18:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19345#M2741</guid>
      <dc:creator>remy06</dc:creator>
      <dc:date>2010-08-02T14:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: duplicated events when monitoring from log file</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19346#M2742</link>
      <description>&lt;P&gt;Hi!!&lt;/P&gt;

&lt;P&gt;Does "followTail" work in case of  windows logs? If so, do I have to have crcSalt set to some text alongwith followTail?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 07:40:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/duplicated-events-when-monitoring-from-log-file/m-p/19346#M2742</guid>
      <dc:creator>MousumiChowdhur</dc:creator>
      <dc:date>2017-07-20T07:40:09Z</dc:date>
    </item>
  </channel>
</rss>

