Monitoring Splunk

Monitoring Avamar backup agent job logs

tomiju
Engager

We are testing Splunk if we could monitor our Avamar backup system agent job logs and see where backups are failing. Backup jobs are logged in individual log files where one file contains logs of one backup job. After certain period old log files are deleted.

So I added in inputs.conf file:
[monitor://C:\Program Files\avs\var\clientlogs\*.log]

But log files don't get logged. In Forwarders splunkd.log I have errors:

TailingProcessor - File will not be read, seekptr checksum did not match

TailingProcessor - File will not be read, is too small to match seekptr checksum

So I probaly need some other settings too in inputs.conf? And I've like to see one log file like one event in Splunk, is this possible?

Tags (3)
0 Karma

tomiju
Engager

OK I'm getting these log files into indexer. Is there a way to make one log file = one event?

0 Karma

JSapienza
Contributor

You need to add crcSalt to the input.conf stanza:

http://docs.splunk.com/Documentation/Splunk/5.0.3/Admin/Inputsconf

    crcSalt = < SOURCE >.

* Use this setting to force Splunk to consume files that have matching CRCs (cyclic redundancy checks). (Splunk only 
  performs CRC checks against the first few lines of a file. This behavior prevents Splunk from indexing the same 
  file twice, even though you may have renamed it -- as, for example, with rolling log files. However, because the 
  CRC is based on only the first few lines of the file, it is possible for legitimately different files to have 
  matching CRCs, particularly if they have identical headers.)
* If set, < string > is added to the CRC.
* If set to the literal string < SOURCE > (including the angle brackets), the full directory path to the source file 
  is added to the CRC. This ensures that each file being monitored has a unique CRC.   When crcSalt is invoked, 
  it is usually set to < SOURCE >.
* Be cautious about using this attribute with rolling log files; it could lead to the log file being re-indexed 
  after it has rolled. 
* Defaults to empty. 

tomiju
Engager

Yes. Adding crcSalt makes logs come into splunk indexer, thank you JSapienza.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...