Use inotify-tools on CentOS 7 or RHEL 7 to watch files and directories for events

Today, I discovered that the package inotify-tools is nowhere to be found in standard CentOS7 or RHEL7 repositories. Alternatives like incron seem to be absent as well. The inotify-tools can be used to watch a directory or file for activity and take an action when a file is changed, added, edited or simply read. You can find a workaround (or call it solution) for the absence of the inotify-tools in the repositories here.

 

Sometimes, for various reasons, a directory needs to be watched for new files, file changes, etc. When a change occurs, a certain action should be taken, like copying the files elsewhere or send an email with to notify someone of the changes. There are a lot of such imaginable scenarios to think of.

inotify

The inotify mechanism which exists in the Linux kernel since release 2.6.13 is ideal for purposes as described above. Inotify notifies the kernel on file changes so it’s not needed to explicitly scan the file system for changes on a regular basis. To use inotify, there are various packages available for different programming languages (like Perl or Python).

inotify-tools

The package inotify-tools contains some tools, written in C, to easily access the inotify-mechanism via the command line or bash. More information about the project can be found here.

Compiling inotify-tools for el7

Apparently, inotify-tools isn’t available (yet) for the latest releases of CentOS and RHEL in any of the popular repositories. In order to use the tools, you’ll have to compile them yourself. One big advantage is that inotify-tools doesn’t have any dependencies besides the kernel with inotify-support, so this shouldn’t be such a big problem.

To start, we need to make sure that we have the necessary tools to compile the sources so we’ll install gcc, cpp, make and their dependencies:

When we’re ready to build the sources, we can download them from Github here
I also created a mirror on http://jensd.be/download/inotify-tools-3.14.tar.gz

After the download, unpack the tar-archive and go into the newly created directory which contains the extracted files:

From here, generate the Makefile by running ./configure:

Once we have a Makefile, we can start building from the inotify-tools source code and generate the executables and libs by executing make:

Once we compiled everything and generated the man-pages, we can do the actual “installation” by copying the generated files to their correct location. This requires superuser rights, so we need to use sudo:

At this time, the inotify-tools should be installed on your machine. Since these tools do not have any external dependencies it’s very unlikely for them to get broken during package upgrades.

 

Using inotify-tools to watch a directory and take action

Now that we have a working installation of the inotify-tools, we can start using them.

The easiest way to use the tools is to create a small bash-script that will monitor a directory and takes action when something is added or changed in that directory. As an example, I created this script, watch-test.sh, that logs all actions that were taken on a certain directory.

Contents of the script:

Don’t forget to make the file executable, then execute the script in the background (by putting the & after the command) and redirect it’s output to /dev/null in order to keep our shell clean:

When do some basic actions on the folder which we are watching, we should see all actions taken in the logfile:

To stop the script, simply bring it back to the foreground and stop it with Ctrl + C:

Looking at the log, we can see that the above executed actions: copy, move, modify and open are logged perfectly to our watchlog.txt

The above script is just a small example what you can do with the inotify-tools. Besides logging you could take other actions like moving, changing or executing something that is related to the files that were touched in the watched directory.

0 (0)
Article Rating (No Votes)
Rate this article
Attachments
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
Linux – Securing your important files with XFS extendend attributes
Viewed 7661 times since Wed, Jul 25, 2018
Deskshare TLS over Stunnel
Viewed 2913 times since Fri, Sep 28, 2018
Linux ssh Hide OpenSSH Version Banner
Viewed 52078 times since Wed, Apr 22, 2020
Build a simple RPM that packages a single file
Viewed 8732 times since Sat, Jun 2, 2018
HowTo: The Ultimate Logrotate Command Tutorial with 10 Examples
Viewed 5512 times since Fri, Nov 30, 2018
How to create stunnel with systemd? stunnel
Viewed 10084 times since Thu, Jan 16, 2020
ZFS: Verify/change properties of a zfs filesystem
Viewed 2727 times since Sun, Jun 3, 2018
RHEL7: Configure automatic updates.
Viewed 1998 times since Wed, Oct 17, 2018
A Quick and Practical Reference for tcpdump
Viewed 12652 times since Fri, Jul 27, 2018
How to use yum command on CentOS/RHEL
Viewed 11179 times since Wed, Oct 17, 2018