<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to index certain logs only during a certain time range (6am - 6pm)? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/612131#M105964</link>
    <description>&lt;P&gt;What would the Regex look like to discard events on just Saturday from 12AM to 4AM?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Sep 2022 18:14:51 GMT</pubDate>
    <dc:creator>vinnithenose</dc:creator>
    <dc:date>2022-09-06T18:14:51Z</dc:date>
    <item>
      <title>How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267613#M51277</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;

&lt;P&gt;I have 4 log files on one Host that I want to index/ingest.  &lt;/P&gt;

&lt;P&gt;Log #1, #2, #3 will be ingested 24 hours a day, but log file #4 shares a batch process in the evening that has 20 - 30GB per evening of events that is not needed, nor do we want to pay for - because I wouldn't use them at this point in time.  &lt;/P&gt;

&lt;P&gt;I want to avoid stopping the Splunk Universal Forwarder Windows service from 6pm to 6am because that would mean that logs #1, #2, &amp;amp; #3 will not index.  Also, I believe it would pool up in the fish bucket anyway, so that will null my effort to exclude indexing from 6pm to 6am for log #4.  &lt;/P&gt;

&lt;P&gt;Any ideas how I can avoid indexing log #4 from 6pm to 6am (night time batch window)?  &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 22:51:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267613#M51277</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-08T22:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267614#M51278</link>
      <description>&lt;P&gt;Hi agoktas,&lt;/P&gt;

&lt;P&gt;there are multiple ways of achieve this: &lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Blacklist the file in your &lt;CODE&gt;inputs.conf&lt;/CODE&gt; &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.1511/admin/Inputsconf#inputs.conf.example"&gt;http://docs.splunk.com/Documentation/Splunk/6.3.1511/admin/Inputsconf#inputs.conf.example&lt;/A&gt; see option &lt;CODE&gt;blacklist =&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Filter out the un-wanted events on a heavy weight forwarder or indexer &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Monitor not the directory, but each log file separate in &lt;CODE&gt;inputs.conf&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;STRONG&gt;Update:&lt;/STRONG&gt;&lt;BR /&gt;
Following up all comments, this was the final working config:&lt;/P&gt;

&lt;P&gt;Here is the final config that looks to be working great (we forgot '00' for the midnight hour): &lt;BR /&gt;
Indexer configuration:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;props.conf&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[AppInternal]
TRANSFORMS-null= Appsetnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;CODE&gt;transforms.conf&lt;/CODE&gt; &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#Discard all events between 6pm - 6am
[Appsetnull]
REGEX = (?:d+/d+/d+|d+-d+-d+)s(18|19|20|21|22|23|00|01|02|03|04|05):
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 23:25:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267614#M51278</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-08T23:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267615#M51279</link>
      <description>&lt;P&gt;Hi MuS, &lt;/P&gt;

&lt;P&gt;From my understanding, you can only blacklist files or a regex value for a source's/file's content.  &lt;/P&gt;

&lt;P&gt;But I don't see anything where you can configure blacklist time frames.  &lt;/P&gt;

&lt;P&gt;Am I just not seeing the documentation pertaining to this?  &lt;/P&gt;

&lt;P&gt;Have you set something like this up before?  &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 00:00:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267615#M51279</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-09T00:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267616#M51280</link>
      <description>&lt;P&gt;Sorry my bad, go for the &lt;CODE&gt;nullQueue&lt;/CODE&gt; filtering solution from the docs &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; Hopefully you will have some unique identifier for the un-needed events. Do this on the indexer and re-start splunk. &lt;/P&gt;

&lt;P&gt;otherwise the only solution time wise, would be an external cron job that stops the universal forwarder, checks this log 4 for the end of the batch process and &lt;CODE&gt;echo "" &amp;gt; log.4&lt;/CODE&gt; and restarts the universal forwarder again.....&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 01:13:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267616#M51280</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T01:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267617#M51281</link>
      <description>&lt;P&gt;To add to MuS's answer, which probably has the right technique;&lt;/P&gt;

&lt;P&gt;If you can't identify events by some string to use nullQueue consistently and easily, ...  Wait, MuS, you'll probably know this better than me, but can you possibly do it on a match of time strings?  As per your link to the docs, yiou could just set your REGEX to something that will match hours 18-23 and 0-5.  (Possibly more easily done in two separate stanzas).  You'll have to be careful, and you'll have to have very consistently identifiable timestamps, but I think this might be the way to do it if this is possible.&lt;/P&gt;

&lt;P&gt;Beyond that, here are some other options and comments that I came up:&lt;/P&gt;

&lt;P&gt;Any technique that stops/starts/changes the local forwarder seems like it won't work unless you do at least some local file manipulation.  As MuS says, something like "erasing" the log4 file could do it if that were possible in a reasonable timeframe, so your process would be to stop the UF while the process runs for an hour, clear out the file then restart the UF.  That will interrupt the other file inputs for the duration, but they'll catch up.&lt;/P&gt;

&lt;P&gt;Along that same thread but with less interruption to the other files, you could stop the forwarder, change the config to ignore file 4 and restart.  At the end of the period, you could then "erase" file 4, fix the config back and restart the forwarder.  You still have to erase or remove file 4 or else the forwarder will just grab it all anyway.  You could just rename it so it no longer matches the inputs before your last restart.&lt;/P&gt;

&lt;P&gt;For the nullQueue side, same sort of technique as the first may work.  At the beginning of your nullQueue period you could stop the forwarder, copy a config into place that does the nullQueue on file4's inputs, then start it back up.  At the end, reverse the process.  That way you would have a nearly uninterrupted ingest of files1-3 (and even file4), but the period you don't want would have file 4's contents being sent to the big bit bucket in the sky.  This does mean you have another Splunk instance of some sort restarting twice a day, possibly interrupting something else.&lt;/P&gt;

&lt;P&gt;Let us know if any of these help, or if one sounds particularly wonderful but you need a little help implementing it!&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 03:11:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267617#M51281</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2015-12-09T03:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267618#M51282</link>
      <description>&lt;P&gt;That sounds perfect.  &lt;/P&gt;

&lt;P&gt;In fact, I'm now remembering a Splunk sales engineer mentioning this a while back for a similar situation.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;
I'll give this a shot.  This should work just fine.  &lt;/P&gt;

&lt;P&gt;By any chance, would you happen to know the regex value for greater than 6pm &amp;amp; less than 6am?  &lt;/P&gt;

&lt;P&gt;Thanks! &lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 19:33:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267618#M51282</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-09T19:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267619#M51283</link>
      <description>&lt;P&gt;great idea to filter on the time! Thanks for this hint!&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 19:40:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267619#M51283</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T19:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267620#M51284</link>
      <description>&lt;P&gt;Can you provide some examples of the events containing the time?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 19:40:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267620#M51284</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T19:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267621#M51285</link>
      <description>&lt;P&gt;Absolutely.&lt;/P&gt;

&lt;P&gt;There are actually 2 files that I will be dealing with (log #4 &amp;amp; log #5). Here are examples of each:&lt;BR /&gt;&lt;BR /&gt;
Log #4 example: &lt;BR /&gt;
12,User:R_getStuff:1234567:id,com.company.demographics.app.inside.pf.Addid,user,OK,2015/12/09 11:42:48:477,2015/12/09 11:42:48:477,0&lt;BR /&gt;
Log $5 example: &lt;BR /&gt;
2015-12-09 11:43:10,801 DEBUG - _standard | Entering Summary2.inc |  User: blah|  Koid:CHOOSE_ACCOUNT:1234567:blah blah&lt;/P&gt;

&lt;P&gt;The positioning of the date/time stamp are in different spots, but that shouldn't be a problem. &lt;BR /&gt;
The date/time is formatting different between the two, but that shouldn't matter because I'm only looking at the time hour &amp;amp; minute - which is formatted the same of course.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  So only 1 regex value needed for both stanzas that applies for only hour &amp;amp; minute.  &lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:06:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267621#M51285</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2020-09-29T08:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267622#M51286</link>
      <description>&lt;P&gt;Based on the examples and assuming you will have 24 hours in the logs(?) try this regex:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?:\d+\/\d+\/\d+|\d+-\d+-\d+)\s(07|08|09|10|11|12|13|14|15|16|18):
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The first group will match both possible date formats and the second group will macht any hour from 07 til 18 ..... Does that makes sense?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 20:04:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267622#M51286</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T20:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267623#M51287</link>
      <description>&lt;P&gt;Since this value would send it to the nullQueue, I'm guessing we would do this instead (batch window):  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?:\d+\/\d+\/\d+|\d+-\d+-\d+)\s(19|20|21|22|23|01|02|03|04|05|06)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So the stanza would look like: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = (?:\d+\/\d+\/\d+|\d+-\d+-\d+)\s(19|20|21|22|23|01|02|03|04|05|06)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Does that look right?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 20:20:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267623#M51287</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-09T20:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267624#M51288</link>
      <description>&lt;P&gt;HeHe, I keep messing up things here (the time range this time) &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
That's the &lt;CODE&gt;transforms.conf&lt;/CODE&gt; and it looks good, don't forget the &lt;CODE&gt;props.conf&lt;/CODE&gt; to match it to &lt;CODE&gt;source&lt;/CODE&gt; and place it on either a heavy weight forwarder or an indexer and restart Splunk after the change.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 20:32:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267624#M51288</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T20:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267625#M51289</link>
      <description>&lt;P&gt;Cool.  I'll give this a shot.  &lt;/P&gt;

&lt;P&gt;We have 1 indexer/search head and I'll configure both the props.conf &amp;amp; transforms.conf there.  &lt;/P&gt;

&lt;P&gt;I'll restart the indexer and see how things go. I'll probably be doing this tomorrow and will update this thread on how it turns out. &lt;/P&gt;

&lt;P&gt;Thanks so much for your help! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 20:45:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267625#M51289</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-09T20:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267626#M51290</link>
      <description>&lt;P&gt;By the way, does the end of that regex value need to have a colon?  I noticed you had it in your first example.  &lt;/P&gt;

&lt;P&gt;Please verify this is correct? &lt;BR /&gt;
&lt;CODE&gt;(?:\d+\/\d+\/\d+|\d+-\d+-\d+)\s(19|20|21|22|23|01|02|03|04|05|06):&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 21:21:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267626#M51290</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-09T21:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267627#M51291</link>
      <description>&lt;P&gt;This is just to make sure it does match the timestamp, it will be the &lt;CODE&gt;:&lt;/CODE&gt; between the hour and the minute. If you are 1000% sure there are no other events containing something like &lt;CODE&gt;1234-12-12 20 foo&lt;/CODE&gt; or &lt;CODE&gt;1234/12/12 20 foo&lt;/CODE&gt; you won't need it....otherwise add it.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 21:37:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267627#M51291</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-09T21:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267628#M51292</link>
      <description>&lt;P&gt;I believe I'm on the last piece of this puzzle...&lt;/P&gt;

&lt;P&gt;I have 2 servers involved, and only one of them needs to have the events for a particular set of logs sent to the nullQueue during the 6pm - 6am time window. &lt;/P&gt;

&lt;P&gt;So that means I need to know how to specify the particular hostname + the log name in the example provided in &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;http://docs.splunk.com/Documentation/Splunk/6.3.1511/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;.  &lt;/P&gt;

&lt;P&gt;Because in the example of the link above, it only is specifying the log name/path as the source.  How do I add the host as well?  &lt;/P&gt;

&lt;P&gt;Any ideas how I do this?  Can you provide an example? &lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 22:29:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267628#M51292</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-14T22:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267629#M51293</link>
      <description>&lt;P&gt;How about adding the host name to the regex? Because the props.conf stanza can be either source, sourcetype or host .....&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 22:42:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267629#M51293</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-14T22:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267630#M51294</link>
      <description>&lt;P&gt;In this case, it will need to be host &amp;amp; source combined because I have 2 servers.  &lt;/P&gt;

&lt;P&gt;Host A will need to restrict 6pm - 6am for logging with Log A (systemout.log) &amp;amp; Log B (systemoutServerA.log).&lt;BR /&gt;&lt;BR /&gt;
Host B doesn't need the time restriction for Log A (systemout.log) &amp;amp; Log B (systemoutServerB.log).  &lt;/P&gt;

&lt;P&gt;If both servers had the same restriction needs, I would be home free.  But since one is able to ingest 24hours a day, then it throws a wrench in the works. &lt;/P&gt;

&lt;P&gt;Thanks. &lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 22:50:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267630#M51294</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-14T22:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267631#M51295</link>
      <description>&lt;P&gt;In essence, I would need  to be both:  host &amp;amp; source instead of just one.    &lt;/P&gt;

&lt;P&gt;When broth criteria are met, then this would apply for these events.  &lt;/P&gt;

&lt;P&gt;Here is what I was thinking for props.conf:&lt;BR /&gt;&lt;BR /&gt;
[host::HOSTA]&lt;BR /&gt;
[source::(?i)systemout.log.log$|systemoutServerA.log$]&lt;BR /&gt;
TRANSFORMS-null= Applicationsetnull&lt;/P&gt;

&lt;P&gt;But I'm not sure if that will work.  Perhaps both 's need to be on the same line?  Comma delimited?  Even if possible?  &lt;/P&gt;

&lt;P&gt;Thoughts? &lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 23:11:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267631#M51295</guid>
      <dc:creator>agoktas</dc:creator>
      <dc:date>2015-12-14T23:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to index certain logs only during a certain time range (6am - 6pm)?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267632#M51296</link>
      <description>&lt;P&gt;easiest way to achieve that, would be to assign a different sourcetype to the log that needs to be excluded or as stated before use the host in the regex like in this example &lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0/Data/Advancedsourcetypeoverrides#Example:_Assign_a_source_type_to_events_from_a_single_input_but_different_hosts"&gt;http://docs.splunk.com/Documentation/Splunk/5.0/Data/Advancedsourcetypeoverrides#Example:_Assign_a_source_type_to_events_from_a_single_input_but_different_hosts&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 23:40:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-index-certain-logs-only-during-a-certain-time-range-6am/m-p/267632#M51296</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2015-12-14T23:40:40Z</dc:date>
    </item>
  </channel>
</rss>

