Splunk Enterprise

How to write inputs.conf to Monitor files in a directory which is dynamic?

sarahnazzar
Explorer

Hi All,

I want to monitor files which keeps changing the filename according to the current date falling under respective month and year directory. Can anyone please help me out how can we monitor the same. I tried using wild card in the inputs.conf, but it seems to be not working.

Format:

D:\Logs\<dynamic-year>\<dynamic-month>\<dynamic-date>.txt

D:\Logs\2022\04\21042022.txt

I used the below config under inputs.conf

[monitor://D:\Logs\*\*\*.txt]
disabled = true
crcSalt = <SOURCE>
index = indexname
sourcetype = sourcetypename

 

Many Thanks in Advance! 

 

Labels (2)
Tags (2)
0 Karma
1 Solution

smurf
Communicator

"The asterisk wildcard matches anything in that specific folder path segment.

Unlike ..., * does not recurse through subfolders.".

You can read more about it in the docs: Specify input paths with wildcards - Splunk Documentation

 

I think your stanza should be working without that typo, but if it doesn't I would try (...).

I also noticed that you have disabled = true. If you want it active, it should be false.

 

View solution in original post

0 Karma

smurf
Communicator

Hi,

I think your stanza should work with a small change - removing the double backslash

[monitor://D:\Logs\*\*\*.txt]

 I personally would use ... like this:

[monitor://D:\Logs\...\*.txt]
0 Karma

sarahnazzar
Explorer

Hi @smurf 

Thanks for your response!

Apologies.. double slash was a typo, you mean just period (...) instead of wildcard and backslash (*\*)?

[monitor://D:\Logs\...\*.txt]

 

0 Karma

smurf
Communicator

"The asterisk wildcard matches anything in that specific folder path segment.

Unlike ..., * does not recurse through subfolders.".

You can read more about it in the docs: Specify input paths with wildcards - Splunk Documentation

 

I think your stanza should be working without that typo, but if it doesn't I would try (...).

I also noticed that you have disabled = true. If you want it active, it should be false.

 

0 Karma

sarahnazzar
Explorer

Many thanks @smurf  this worked!! 🙂

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...