Getting Data In

What are the best practices for huge log directory with files that are overwritten with each entry?

twinspop
Influencer

We are using Informatica software. The logs produced are dumped into 1 directory. Currently there are 1000+ log files produced from various runs. Each file needs to be consumed as 1 event. A new run will overwrite the log file from a similar run.

My current inputs entry:

[monitor:///apps/informatica/powercenter91/server/infa_shared/SessLogs/*.log]
host = etltest1
ignoreOlderThan = 1d
index = main
sourcetype = etl_logs

And props entry:

[source:*SessLogs/*.log]
CHECK_METHOD = modtime

Is this the optimum config?

Thanks!

Tags (2)

jayannah
Builder

I think the below configuration should work if the standard timestamp is used in the log which is automatically recognized by SPlunk. Otherwise, please give the sample log file, we shall give you the time stamp recognition configuration required in props.conf

Since you want entire file content as 1 line, SHOULD_LINEMERGE=false will combines multi lines (if any) into single line and if the characters are more than 10,000, then TRUNCATE=0 will tell splunk indexer not to truncate the event at 10,000 characters.

                 props.conf
                 [etl_logs]
                 SHOULD_LINEMERGE = false
                 TRUNCATE=0
                 CHECK_METHOD = modtime
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...