Getting Data In

Need assistance with getting fschange to work

bbailey1024
Explorer

I have a universal forwarder sending logs to Splunk and with monitor, everything is working just fine. However, I thought I'd test out fschange to log file system modifications on some of my Linux hosts. To that end I've modified the $SPLUNK/etc/system/local/inputs.conf so it reads as follows:

[default]
host = Hostname

[filter:whitelist:configs]
regex1 = .*\.txt

[filter:blacklist:terminal-blacklist]
regex1 = .?

[fschange:/path/to/dir]
index = _audit
recurse = true
followLinks = false
signedaudit = false
fullEvent = true
sendEventMaxSize = 1048576
delayInMills = 1000
filters = configs,terminal-blacklist

This sample was taken directly from http://docs.splunk.com/Documentation/Splunk/4.3.4/Data/Monitorchangestoyourfilesystem

With the above configuration I would expect that any changes to a txt file in the monitored directory would be logged. However, if I make a change to a txt file in that directory, no log entry is observed in Splunk.

I'm running Splunk 4.3.3, UF 4.3.4, and have the nix Technology Add-on installed (I need this).

Any help would be appreciated as I'm sure it's something small that I've overlooked.

Tags (1)
1 Solution

adamw
Communicator

What search syntax are you using when trying to find this event?

It is likely that the _audit index is not being searched by default, so if you searched "index=_audit sourcetype=fs_notification" or "index=_audit sourcetype=audittrail", depending on your deployment(see bottom of http://docs.splunk.com/Documentation/Splunk/4.3.4/Data/Monitorchangestoyourfilesystem) you would probably see the events.

View solution in original post

adamw
Communicator

What search syntax are you using when trying to find this event?

It is likely that the _audit index is not being searched by default, so if you searched "index=_audit sourcetype=fs_notification" or "index=_audit sourcetype=audittrail", depending on your deployment(see bottom of http://docs.splunk.com/Documentation/Splunk/4.3.4/Data/Monitorchangestoyourfilesystem) you would probably see the events.

bbailey1024
Explorer

That was it, thanks for the help adamw!

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...