Deployment Architecture

Splunk Forwarder Unix App not sending logs

brianokelly
Explorer

We installed the unix app on our universal forwarder on RHEL6. We modified the inputs.conf to the following:

[monitor:///var/log]
_whitelist=(\.log|log$|^messages|^secure|mesg$|cron$|acpid$|\.out)
_blacklist=(lastlog)
index=os
disabled = 0

We noticed though that we did not receive any logs from /var/log/messages even though it appears in the list. We did however receive other log messages. We had to add the following for it to correctly monitor the messages file:

[monitor:///var/log/messages] 
index = os 
disabled = 0

Has anyone seen a reason as to why this could happen.

Tags (2)

davewood
Explorer

I had the same issue. Sometime between 4.2 and 4.2.2, whitelist has seemingly been changed to match the entire path, not just the filename. This means the the "^" anchor prevents "/var/log/messages" being matched, so if you change the regex to be something like:

whitelist=(\.log|log$|\/messages|\/secure|mesg$|cron$|acpid$|\.out)

(i.e. match a filename containing "/messages")

it should work.

If you're being pedantic, then you may notice this will also match something like:

/var/log/someapp/messages/not_a_logfile

So if you're worried about that then you could use the following pattern to match exactly the files that would have been matched previously:

whitelist=(\.log|log$|\/messages[^\/]*$|\/secure[^\/]*$|mesg$|cron$|acpid$|\.out)

(i.e. a filename beginning with "messages").

0 Karma

Drainy
Champion

Couldn't you just incorporate it as |messages| in the regex? this will be an exact match then (Unless you've already tried this 🙂

Also, whilst not a really a problem the _whitelist and _blacklist are depreciated and should really be replaced with just whitelist and blacklist (assuming you're using a fairly new version of the UF.
http://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf

Alternatively you could just use the blacklist filter to just filter whichever logs you don't want it to index and don't define a whitelist at all.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...