Getting Data In

can splunk monitor fschange

nagarjuna280
Communicator

I want to know the user details, what changes happened, when, if someone makes changes to config files. is that possible?
I tried something below, I got events as

6/14/10 9:20:52.000 AM Mon Jun 14 09:20:52 2010 action=add, path="C:\TEMP\configs.txt", isdir=0, size=388, gid=-1, uid=-1, modtime="Mon Jun 14 09:17:56 2010", mode="rwxrwxrwx", hash=

[monitor://\192.168.1.12\Siteroot\Web.config]
disabled = false
index = _audit
sourcetype =dfgd
pollPeriod = 60

and when I tried to set up this config in Splunk forwarder, I didn't get any results.

Tags (2)
0 Karma

inventsekar
SplunkTrust
SplunkTrust

from inputs.conf documentation -
http://docs.splunk.com/Documentation/Splunk/7.2.1/Admin/Inputsconf

[fschange:D:\Siteroot\web.config\]
fullEvent=true
pollPeriod=60
recurse=true
sendEventMaxSize=100000
index=main
sourcetype =dfgd

i think instead of monitor you should use fschange
and for index, we should not use _audit
(maybe -index=mainORsomething)

EDIT - thanks @harsmarvania57
Please keep in mind that this feature is deprecated and will be removed in future version of Splunk. Please see documentation http://docs.splunk.com/Documentation/Splunk/7.2.1/Data/Monitorchangestoyourfilesystem

 This feature has been deprecated as of Splunk Enterprise version 5.0. This means that although it continues to function in version 6.x of Splunk software, it might be removed in a future version. As an alternative, you can:

     Learn how to monitor file system changes on Windows systems.
     Use the auditd daemon on *nix systems and monitor output from the daemon.

 For a list of all deprecated features, see the topic Deprecated features in the Release Notes. 

harsmarvania57
Ultra Champion

Please keep in mind that this feature is deprecated and will be removed in future version of Splunk. Please see documentation http://docs.splunk.com/Documentation/Splunk/7.2.1/Data/Monitorchangestoyourfilesystem

This feature has been deprecated as of Splunk Enterprise version 5.0. This means that although it continues to function in version 6.x of Splunk software, it might be removed in a future version. As an alternative, you can:

    Learn how to monitor file system changes on Windows systems.
    Use the auditd daemon on *nix systems and monitor output from the daemon.

For a list of all deprecated features, see the topic Deprecated features in the Release Notes. 
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...