<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic multiple fschange  on the same files in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23521#M3692</link>
    <description>&lt;P&gt;Will this cause any issues, I would like to do&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[fschange:/etc]
index = linux-security
recurse = true
followLinks = false
signedaudit = false
fullEvent = false
delayInMills = 1000
pollPeriod = 600
sourcetype = linux_etc_fschange
hashMaxSize = 1048576
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[filter:whitelist:files]
regex1 = ^passwd$
regex2 = ^group$


[fschange:/etc/]
index = linux-security
recurse = true
followLinks = false
signedaudit = false
fullEvent = true
delayInMills = 1000
pollPeriod = 600
sourcetype = linux_etc_full_fschange
hashMaxSize = 1048576
filters = files
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I know you are not support to use two monitory inputs against the same files, but I didn't see anything in the documentation that says this would be a bad idea for fschange. My goal is to monitor /etc/passwd and /etc/group for changes and to log the files on a change so I can easily review user adds/changes/deletes.  &lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2011 22:01:22 GMT</pubDate>
    <dc:creator>imacdonald2</dc:creator>
    <dc:date>2011-06-06T22:01:22Z</dc:date>
    <item>
      <title>multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23521#M3692</link>
      <description>&lt;P&gt;Will this cause any issues, I would like to do&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[fschange:/etc]
index = linux-security
recurse = true
followLinks = false
signedaudit = false
fullEvent = false
delayInMills = 1000
pollPeriod = 600
sourcetype = linux_etc_fschange
hashMaxSize = 1048576
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[filter:whitelist:files]
regex1 = ^passwd$
regex2 = ^group$


[fschange:/etc/]
index = linux-security
recurse = true
followLinks = false
signedaudit = false
fullEvent = true
delayInMills = 1000
pollPeriod = 600
sourcetype = linux_etc_full_fschange
hashMaxSize = 1048576
filters = files
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I know you are not support to use two monitory inputs against the same files, but I didn't see anything in the documentation that says this would be a bad idea for fschange. My goal is to monitor /etc/passwd and /etc/group for changes and to log the files on a change so I can easily review user adds/changes/deletes.  &lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 22:01:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23521#M3692</guid>
      <dc:creator>imacdonald2</dc:creator>
      <dc:date>2011-06-06T22:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23522#M3693</link>
      <description>&lt;P&gt;This isn't a great idea for fschange. You are going to run into some odd behaviors that might not be entirely consistent. Also, I don't think you need the 'hashMaxSize' value, so I would suggest you leave it off. I've seen this cause continual updates to files on certain systems and wouldn't use this unless it is explicitly needed. &lt;/P&gt;

&lt;P&gt;I would suggest that you remove your whitelist and sourcetyping from inputs.conf as it seems your goal is to get different sourcetypes applied to these inputs. You can use props/transforms to take care of sourcetyping. &lt;/P&gt;

&lt;P&gt;So keep the fschange stuff that you've got to monitor the entire /etc/ folder, I think that should work. The unix app does something similar, which you can look at if you'd like, its similar to this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor:///etc]
_whitelist=REGEX

[config_file]
LINE_BREAKER = ^()$
TRUNCATE = 1000000
SHOULD_LINEMERGE = false
DATETIME_CONFIG = NONE
CHECK_METHOD = modtime
KV_MODE = none
pulldown_type = true
SEGMENTATION-all      = whitespace-only
SEGMENTATION-inner    = whitespace-only
SEGMENTATION-outer    = whitespace-only
SEGMENTATION-standard = whitespace-only
LEARN_MODEL = false

[source::/etc/(passwd|group)]
sourcetype=config_file
CHECK_METHOD = modtime
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;setting the sourcetype to config_file and then calling this line breaker indexes the whole file. &lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 22:11:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23522#M3693</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2011-06-06T22:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23523#M3694</link>
      <description>&lt;P&gt;So the goal is to be able to do a diff on just /etc/passwd and /etc/group from with in splunk, but have all other files in /etc be logged for changes but not store the contents of the files. if having 2 fschange directives on the same directory is not recommended, do you have any suggestions?&lt;/P&gt;

&lt;P&gt;I will be using the same sourcetype when I roll this to prod, its different just for testing&lt;/P&gt;

&lt;P&gt;After posting I discovered that doing a whitelist on its own didn't seem to limit it to just those two files, so I added the following &lt;/P&gt;

&lt;P&gt;[filter:blacklist:blfiles]&lt;BR /&gt;
regex1 = .*&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 22:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23523#M3694</guid>
      <dc:creator>imacdonald2</dc:creator>
      <dc:date>2011-06-06T22:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23524#M3695</link>
      <description>&lt;P&gt;I edited my answer to reflect your goals. I &lt;EM&gt;THINK&lt;/EM&gt; this has a good chance of being a solution.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2011 23:03:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23524#M3695</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2011-06-06T23:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23525#M3696</link>
      <description>&lt;P&gt;Thanks, I am testing it.&lt;/P&gt;

&lt;P&gt;And to confirm what you were saying having two [fschange:/etc/] entries does not work, it keeps adding and removing all the files in the /etc/&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2011 17:52:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23525#M3696</guid>
      <dc:creator>imacdonald2</dc:creator>
      <dc:date>2011-06-07T17:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23526#M3697</link>
      <description>&lt;P&gt;I have this working if I split it out into &lt;/P&gt;

&lt;P&gt;[source::/etc/passwd]&lt;BR /&gt;
and&lt;BR /&gt;
[source::/etc/group]&lt;/P&gt;

&lt;P&gt;but &lt;/P&gt;

&lt;P&gt;[source::/etc/(passwd|group)]&lt;/P&gt;

&lt;P&gt;Isn't working any suggestions?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 02:20:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23526#M3697</guid>
      <dc:creator>imacdonald2</dc:creator>
      <dc:date>2011-06-08T02:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23527#M3698</link>
      <description>&lt;P&gt;Interesting the following works&lt;/P&gt;

&lt;P&gt;[source::*/etc/(passwd|group)]&lt;/P&gt;

&lt;P&gt;but &lt;/P&gt;

&lt;P&gt;[source::/etc/(passwd|group)]&lt;/P&gt;

&lt;P&gt;doesn't&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 03:03:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23527#M3698</guid>
      <dc:creator>imacdonald2</dc:creator>
      <dc:date>2011-06-08T03:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: multiple fschange  on the same files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23528#M3699</link>
      <description>&lt;P&gt;That is interesting, but I didn't test the specific configuration. Glad to hear a wildcard takes care of it though.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 05:37:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/multiple-fschange-on-the-same-files/m-p/23528#M3699</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2011-06-08T05:37:20Z</dc:date>
    </item>
  </channel>
</rss>

