<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tuning of file monitoring in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191946#M38251</link>
    <description>&lt;P&gt;good one, but remember it will be a lower &lt;CODE&gt;s&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Mar 2014 07:37:15 GMT</pubDate>
    <dc:creator>MuS</dc:creator>
    <dc:date>2014-03-19T07:37:15Z</dc:date>
    <item>
      <title>tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191940#M38245</link>
      <description>&lt;P&gt;Good afternoon, I try monitoring of files. Version of Splunk is 6 . I faced unclear problems for me:&lt;BR /&gt;
1) How to monitor new files and deleting files?&lt;BR /&gt;
2) I created the filter but it doesn't work?&lt;BR /&gt;
3) How to switch off actuating on change of time of the file?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[filter:blacklist:ignore_logs]
regex1 = *.log$
regex2 = *.LOG$

[fschange:C:\Windows\System32]
pollPeriod = 360
filter = ignore_logs
signedaudit = false
hashMaxSize = 10240
recurse = true
followLinks = true
fullEvent = true
sendEventMaxSize = -1
filesPerDelay = 100
delayInMills = 100
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And it permanently repeats in logs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Tue Mar 18 11:32:45 2014 action=update, path="C:\Windows\System32\config\SYSTEM.LOG1", isdir=0, size=262144, gid=-1, uid=-1, modtime="Tue Mar 18 11:28:59 2014", mode="rwxrwxrwx", hash=, chgs="modtime "
Tue Mar 18 11:32:45 2014 action=update, path="C:\Windows\System32\config\SYSTEM", isdir=0, size=13631488, gid=-1, uid=-1, modtime="Tue Mar 18 11:28:59 2014", mode="rwxrwxrwx", hash=, chgs="modtime "
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 18 Mar 2014 05:37:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191940#M38245</guid>
      <dc:creator>vinchakov_a</dc:creator>
      <dc:date>2014-03-18T05:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191941#M38246</link>
      <description>&lt;P&gt;Hi vinchakov_a,&lt;/P&gt;

&lt;P&gt;let me try to answer this:&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;1) How to monitor new files and deleting files?&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;this can be done by using the &lt;CODE&gt;batch&lt;/CODE&gt; input like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[batch://&amp;lt;path&amp;gt;]
* One time, destructive input of files in &amp;lt;path&amp;gt;.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;EM&gt;2) I created the filter but it doesn't work?&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Your regex &lt;CODE&gt;*.log$&lt;/CODE&gt; or &lt;CODE&gt;*.LOG$&lt;/CODE&gt; do not match the file "C:\Windows\System32\config\SYSTEM.LOG1" because you are searching for files containing a literal &lt;CODE&gt;*&lt;/CODE&gt; and ending with either &lt;CODE&gt;.log&lt;/CODE&gt; or &lt;CODE&gt;.LOG&lt;/CODE&gt;. Try to use some thing like this to match also logs containing numbers&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;regex1 = .log(\d+)
regex2 = .LOG(\d+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;EM&gt;3) How to switch off actuating on change of time of the file?&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;I don't fully understand what you mean, so I will not provide an answer....&lt;/P&gt;

&lt;P&gt;hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 07:14:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191941#M38246</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-03-18T07:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191942#M38247</link>
      <description>&lt;P&gt;Thanks, I will try your regex. But I think batch it not that it is necessary for me. It is necessary for me that splunk reported when in the folder there is a new file or the old is deleted.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 07:57:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191942#M38247</guid>
      <dc:creator>vinchakov_a</dc:creator>
      <dc:date>2014-03-18T07:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191943#M38248</link>
      <description>&lt;P&gt;Regex not work...&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 07:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191943#M38248</guid>
      <dc:creator>vinchakov_a</dc:creator>
      <dc:date>2014-03-19T07:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191944#M38249</link>
      <description>&lt;P&gt;you can try &lt;CODE&gt;.log&lt;/CODE&gt; or &lt;CODE&gt;.LOG&lt;/CODE&gt; as well&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 07:22:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191944#M38249</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-03-19T07:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191945#M38250</link>
      <description>&lt;P&gt;I found mistake:&lt;BR /&gt;
filterS = ignore_logs&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 07:33:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191945#M38250</guid>
      <dc:creator>vinchakov_a</dc:creator>
      <dc:date>2014-03-19T07:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: tuning of file monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191946#M38251</link>
      <description>&lt;P&gt;good one, but remember it will be a lower &lt;CODE&gt;s&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 07:37:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/tuning-of-file-monitoring/m-p/191946#M38251</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-03-19T07:37:15Z</dc:date>
    </item>
  </channel>
</rss>

