Splunk Enterprise

How to write inputs.conf to Monitor files in a directory which is dynamic?

sarahnazzar
Explorer

Hi All,

I want to monitor files which keeps changing the filename according to the current date falling under respective month and year directory. Can anyone please help me out how can we monitor the same. I tried using wild card in the inputs.conf, but it seems to be not working.

Format:

D:\Logs\<dynamic-year>\<dynamic-month>\<dynamic-date>.txt

D:\Logs\2022\04\21042022.txt

I used the below config under inputs.conf

[monitor://D:\Logs\*\*\*.txt]
disabled = true
crcSalt = <SOURCE>
index = indexname
sourcetype = sourcetypename

 

Many Thanks in Advance! 

 

Labels (2)
Tags (2)
0 Karma
1 Solution

smurf
Path Finder

"The asterisk wildcard matches anything in that specific folder path segment.

Unlike ..., * does not recurse through subfolders.".

You can read more about it in the docs: Specify input paths with wildcards - Splunk Documentation

 

I think your stanza should be working without that typo, but if it doesn't I would try (...).

I also noticed that you have disabled = true. If you want it active, it should be false.

 

View solution in original post

0 Karma

smurf
Path Finder

Hi,

I think your stanza should work with a small change - removing the double backslash

[monitor://D:\Logs\*\*\*.txt]

 I personally would use ... like this:

[monitor://D:\Logs\...\*.txt]
0 Karma

sarahnazzar
Explorer

Hi @smurf 

Thanks for your response!

Apologies.. double slash was a typo, you mean just period (...) instead of wildcard and backslash (*\*)?

[monitor://D:\Logs\...\*.txt]

 

0 Karma

smurf
Path Finder

"The asterisk wildcard matches anything in that specific folder path segment.

Unlike ..., * does not recurse through subfolders.".

You can read more about it in the docs: Specify input paths with wildcards - Splunk Documentation

 

I think your stanza should be working without that typo, but if it doesn't I would try (...).

I also noticed that you have disabled = true. If you want it active, it should be false.

 

0 Karma

sarahnazzar
Explorer

Many thanks @smurf  this worked!! 🙂

0 Karma
Get Updates on the Splunk Community!

Security Highlights: September 2022 Newsletter

 September 2022 The Splunk App for Fraud Analytics (SFA) is now Splunk SupportedUse your existing Splunk ...

Platform Highlights | September 2022 Newsletter

 September 2022 What’s New in 9.0 and How to UpgradeGet a walk through of what is new Splunk Enterprise 9.0 ...

Observability Highlights | September 2022 Newsletter

 September 2022 Splunk Observability SuiteAccess to "Classic" SignalFx Interface Will be Removed on Sept 30, ...