Getting Data In

Inputs.conf to monitor in given time range only

meenal901
Communicator

Hi,

I have a situation: The logs are getting generated 24x7, but the client wants to monitor only during offline hours (18:55 to 07:00). Even if I stop Splunk in online hours, the logs will get indexed.. Is there a solution where I tell splunk to index only in given time range or ignore events older than last 1 hour? The ignoreolderthan parameter of inputs.conf works on last modified date of the files, what about the events within?

Any help would be great!

Thanks.

Tags (1)
0 Karma

esix_splunk
Splunk Employee
Splunk Employee

Use cron to stop/start your syslog listener during that time..

0 Karma

kml_uvce
Builder

use transforms and props.conf file and drop online events(not index) , match _time field in regex in transforms.conf
see route and filter data in http://docs.splunk.com/Documentation/Splunk/6.2.1/Forwarding/Routeandfilterdatad

kamal singh bisht
0 Karma

MuS
SplunkTrust
SplunkTrust

out of pure curiosity, how would you do an regex on an epoch time for those online hours?

0 Karma

meenal901
Communicator

Agreed.. It may not be possible to filter out based on REGEX in props/transforms.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...