All Apps and Add-ons

File/Directory Information Input: When importing a .zip archive, why are there no timestamps or readable text?

BMacher
Path Finder

Hello fellow Splunkies,

I get data into Splunk by monitoring a directory for changes. If I insert an archive (.zip) of about 10 MB the data, it is not imported correctly --> no time stamps + unreadable text. I think the problem might be that Splunk starts the import immediately by unzipping the archive. Since it is not fully copied it fails and Splunk handles the file like binary code.

Does anyone know a solution?

0 Karma
1 Solution

woodcock
Esteemed Legend

Here is the best way. Modify the inputs.conf to add a blicklist for *.zippart
Then have the software that copies the files over, first rename the source file from *.zip to *.zippart, then copy it, then name it back.
If this cannot be done, then you can do something like this:
https://answers.splunk.com/answers/309910/how-to-monitor-a-folder-for-newest-files-only-file.html

View solution in original post

BMacher
Path Finder

I found a better solution myself. Add *.filepart$ to the inputs blacklist. If you transfer files per WinSCP make sure you use SFTP.

woodcock
Esteemed Legend

Here is the best way. Modify the inputs.conf to add a blicklist for *.zippart
Then have the software that copies the files over, first rename the source file from *.zip to *.zippart, then copy it, then name it back.
If this cannot be done, then you can do something like this:
https://answers.splunk.com/answers/309910/how-to-monitor-a-folder-for-newest-files-only-file.html

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...