Monitoring Splunk

How do I set the retention for logs in splunkd.log to 60 days?

sympatiko
Communicator

Hi splunkers,

I just want to keep the last 2 months / 60 days of my splunkd.log . Can I add it on logrotate.conf?

Thanks

0 Karma
1 Solution

jeffland
SplunkTrust
SplunkTrust

You could change the setting of the _internal index by adding these lines to your indexes.conf:

[_internal]
frozenTimePeriodInSecs = 5184000

This would keep everything in that index for longer than the usual month.

Alternatively, you could add a monitor to the splunkd.log to another index and keep those logs extra.

View solution in original post

cbasta
New Member

Edit the log.conf in $SPLUNK_HOME/etc

The only issue is when you do an upgrade of Splunk, that file will get overwritten.

0 Karma

jeffland
SplunkTrust
SplunkTrust

You could change the setting of the _internal index by adding these lines to your indexes.conf:

[_internal]
frozenTimePeriodInSecs = 5184000

This would keep everything in that index for longer than the usual month.

Alternatively, you could add a monitor to the splunkd.log to another index and keep those logs extra.

Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...