Use inotify-tools on CentOS 7 or RHEL 7 to watch files and directories for events

Today, I discovered that the package inotify-tools is nowhere to be found in standard CentOS7 or RHEL7 repositories. Alternatives like incron seem to be absent as well. The inotify-tools can be used to watch a directory or file for activity and take an action when a file is changed, added, edited or simply read. You can find a workaround (or call it solution) for the absence of the inotify-tools in the repositories here.


Sometimes, for various reasons, a directory needs to be watched for new files, file changes, etc. When a change occurs, a certain action should be taken, like copying the files elsewhere or send an email with to notify someone of the changes. There are a lot of such imaginable scenarios to think of.


The inotify mechanism which exists in the Linux kernel since release 2.6.13 is ideal for purposes as described above. Inotify notifies the kernel on file changes so it’s not needed to explicitly scan the file system for changes on a regular basis. To use inotify, there are various packages available for different programming languages (like Perl or Python).


The package inotify-tools contains some tools, written in C, to easily access the inotify-mechanism via the command line or bash. More information about the project can be found here.

Compiling inotify-tools for el7

Apparently, inotify-tools isn’t available (yet) for the latest releases of CentOS and RHEL in any of the popular repositories. In order to use the tools, you’ll have to compile them yourself. One big advantage is that inotify-tools doesn’t have any dependencies besides the kernel with inotify-support, so this shouldn’t be such a big problem.

To start, we need to make sure that we have the necessary tools to compile the sources so we’ll install gcc, cpp, make and their dependencies:

When we’re ready to build the sources, we can download them from Github here
I also created a mirror on

After the download, unpack the tar-archive and go into the newly created directory which contains the extracted files:

From here, generate the Makefile by running ./configure:

Once we have a Makefile, we can start building from the inotify-tools source code and generate the executables and libs by executing make:

Once we compiled everything and generated the man-pages, we can do the actual “installation” by copying the generated files to their correct location. This requires superuser rights, so we need to use sudo:

At this time, the inotify-tools should be installed on your machine. Since these tools do not have any external dependencies it’s very unlikely for them to get broken during package upgrades.


Using inotify-tools to watch a directory and take action

Now that we have a working installation of the inotify-tools, we can start using them.

The easiest way to use the tools is to create a small bash-script that will monitor a directory and takes action when something is added or changed in that directory. As an example, I created this script,, that logs all actions that were taken on a certain directory.

Contents of the script:

Don’t forget to make the file executable, then execute the script in the background (by putting the & after the command) and redirect it’s output to /dev/null in order to keep our shell clean:

When do some basic actions on the folder which we are watching, we should see all actions taken in the logfile:

To stop the script, simply bring it back to the foreground and stop it with Ctrl + C:

Looking at the log, we can see that the above executed actions: copy, move, modify and open are logged perfectly to our watchlog.txt

The above script is just a small example what you can do with the inotify-tools. Besides logging you could take other actions like moving, changing or executing something that is related to the files that were touched in the watched directory.

0 (0)
Article Rating (No Votes)
Rate this article
There are no attachments for this article.
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
Increase A VMware Disk Size (VMDK) Formatted As Linux LVM without rebooting
Viewed 946 times since Wed, May 30, 2018
20 Practical Examples of RPM Commands in Linux rpm
Viewed 974 times since Mon, Feb 18, 2019
Monitoring bezpieczeństwa Linux: integracja auditd + OSSEC cz. I
Viewed 683 times since Fri, Apr 5, 2019
Using IOzone for Linux disk performance analysis
Viewed 2417 times since Wed, Jul 25, 2018
Procedura powiekszania OCFS2 online
Viewed 521 times since Fri, Jun 8, 2018
Netcat shell zabezpieczony hasłem
Viewed 791 times since Thu, May 24, 2018
Zabijanie wszystkich procesów użytkownika
Viewed 789 times since Thu, May 24, 2018
LVM: Reduce an existing Logical Volume / Filesystem
Viewed 627 times since Sat, Jun 2, 2018
RHEL: Route network packets to go out via the same interface they came in
Viewed 1033 times since Sat, Jun 2, 2018
Open SSL HowTo: Decode SSL Certificate
Viewed 478 times since Mon, Feb 18, 2019