Getting Data In

Batch not indexing previously locked file

joonradley
Path Finder

Hi,

I have a problem where batch input will not index files that was locked when Splunk first tried to index the file.

The splunkd.log shows the following entries:

02-20-2012 21:15:43.145 +0200 WARN TailingProcessor - Will retry file='c:\data\data_20120220211543083.log' in 10000ms due to: The process cannot access the file because it is being used by another process.

02-20-2012 21:15:53.005 +0200 ERROR TailingProcessor - Ignoring path due to: failed to open for checksum: 'c:\data\data_20120220211543083.log' (The process cannot access the file because it is being used by another process.)

The file remains in the directory even after it is no longer locked and no further entries are found in splunkd.log for the file 12 hours after the initial entries.

Other files that are not locked get indexed and deleted.

How can I get Splunk to index the previously locked files?

inputs.conf
[batch://c:\data]
sourcetype=AuditData
move_policy = sinkhole
crcSalt =

System: Windows 2008 R2 64-bit, Splunk 4.2.4

Thx

Joon

Tags (2)
0 Karma

NiklasB
Explorer
0 Karma

MarioM
Motivator

did you try moving the file into a subdirectory?

MarioM
Motivator

I am not in batch mode locked files can be indexed if they are being used by another process...I know it does when on monitor mode

0 Karma

joonradley
Path Finder

Thx, moving the files got them indexed, but it does not solve the underlying issue. The locked files do not get indexed.

Any ideas on that?

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...