Getting Data In

How to monitor and index .bz2 files in Splunk?

James_ACN
Loves-to-Learn Everything

Hi, All.

 

How to index compressed files in .bz2 format using Universal Forwarder installed on a Windows server?

In UF:

inputs.conf

[monitor://E:\LogServer\Logs\*.bz2]
sourcetype = XmlWinEventLog
disabled=0
index = main

 

props.conf

[source::...E:\\LogServer\\Logs\\*.bz2]
sourcetype = XmlWinEventLog

[XmlWinEventLog]
invalid_cause = archive
unarchive_cmd = _auto

 

According to the most recent docs Splunk does index compressed files:

https://docs.splunk.com/Documentation/Splunk/8.2.1/Admin/Propsconf

 

But even following these instructions, the logs are still not indexed and I was also unable to check the splunkd.log logs for any error that indicates a problem.

Does anyone have any suggestions?

 

Thanks in advance.

 

James \°/

 

0 Karma

James_ACN
Loves-to-Learn Everything

Hi All!

I still haven't been able to solve this problem.

Does anyone have any outline suggestions?

 

Thanks!

 

James \°/

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Never used it myself but.

unarchive_cmd = <string>
[...]
* This field is only valid on [source::<source>] stanzas.

So setting it on sourcetype should not work.

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...