Getting Data In

Monitor Files and Directories - configured - but nothing is indexing ?

Alfred
Explorer

File Monitor configured - but nothing is indexing ?

here is my inputs.conf 

[monitor://C:\xxxx\xxxxxx\xxxxxxx\xxxxx.docx]
[monitor://C:\xxxxx\xxxxxxx\xxxxxx.docx]
disabled = 0
index=file_integrity_monitoring
sourcetype=test
crcSalt=<SOURCE>

following the article below in our Splunk Cloud environment.

 
https://docs.splunk.com/Documentation/Splunk/8.2.1/Data/Monitorfilesanddirectorieswithinputs.conf

Any idea what is missing ? 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

First, having two consecutive [monitor://...] lines does not create two monitors with the same settings.  The first monitor uses only default settings, whereas the second uses those specified in the stanza.

Second, check splunkd.log to confirm it, but I suspect nothing is ingested because .docx files are binary and Splunk doesn't ingest non-textual data.

Finally, it looks like you want to detect when these files change rather than index the files themselves.  If so, use an fschange input.  See https://docs.splunk.com/Documentation/Splunk/8.2.1/Data/Monitorchangestoyourfilesystem

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

First, having two consecutive [monitor://...] lines does not create two monitors with the same settings.  The first monitor uses only default settings, whereas the second uses those specified in the stanza.

Second, check splunkd.log to confirm it, but I suspect nothing is ingested because .docx files are binary and Splunk doesn't ingest non-textual data.

Finally, it looks like you want to detect when these files change rather than index the files themselves.  If so, use an fschange input.  See https://docs.splunk.com/Documentation/Splunk/8.2.1/Data/Monitorchangestoyourfilesystem

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...