Hello,
By default:
Splunk Enterprise decompresses archive files before it indexes them. It can handle these common archive file types: tar, gz, bz2, tar.gz, tgz, tbz, tbz2, zip, and z.
(http://docs.splunk.com/Documentation/Splunk/6.1.6/Data/Monitorfilesanddirectories)
Is it possible to configure Splunk to not do this? Or another way to handle our scenario?
We have a Windows directory input path that we are indexing *.log files. The problem is, there are .zip files in that folder that also contain *.log files, but we want to ignore those.
Thanks in advance.
All that you need to do is to specify in the monitor "just" the *.log files.
All that you need to do is to specify in the monitor "just" the *.log files.
Masa ; ddrillic,
Thanks for your replies, however, this does not seem to work. Splunk is still looking within the zip file and finding the .log files within it.
It seems as if it is decompressing the archive and finding the .log files within it. I believe it is the decompression that we need to avoid.
What I normally do is being very explicit to the level of the files and not just the directory. Something like - [monitor://\C:\Logs\location\log\*.log]
Using this variation ensures that only files with extension of .log will be processed.
Thank you both for your help.
Using the whitelist does look like it works. We were getting confused by the number of files that appear in the Files and Directory input for that folder. That number seems to represent the number of files found (plus the root folder), not necessarily the ones it has indexed.
I agree with ddrllic.
Have you restarted Splunk?
F.Y.I.
[monitor://\C:\Logs\location\log\*.log]
Splunk will translated this stanza to;
[monitor://\C:\Logs\location\log]
whiltelist = [^\//]+\.log
Also, can you send us example of a file path and the configuration you used?
Assuming your log files exists in C:\Logs\ or sub directories.
- inputs.conf
[monitor://\C:\Logs\....log]
Or, you can make use of white list
- inputs.conf
[monitor://\C:\Logs]
whitelist = \.log$