Getting Data In

Data Retention for different log types

dbcottam
New Member

According to the splunk documentation splunk can retain then delete data for a specified interval of time. I have multiple different log files with different retention requirements.

For example our Business Information Management System (BIM) designates Retention Policies for various types of data.  E-mail is 4 months other data might be weeks or even years.  How does Splunk handle this?

Thank you.

Tags (1)
0 Karma
1 Solution

sdaniels
Splunk Employee
Splunk Employee

You need to create different indexes in order to meet your retention requirements for various data sources. For each index you will be able to control how long you want the data.

http://docs.splunk.com/Documentation/Splunk/latest/admin/HowSplunkstoresindexes

Create a new index and then you can assign that index to one of your data sources in inputs.conf.
index=something. When the data comes in, it will be stored in that index. You can then use the indexes.conf file to change the per index options.

Look at indexes.conf details here - http://docs.splunk.com/Documentation/Splunk/latest/admin/indexesconf

View solution in original post

sdaniels
Splunk Employee
Splunk Employee

You need to create different indexes in order to meet your retention requirements for various data sources. For each index you will be able to control how long you want the data.

http://docs.splunk.com/Documentation/Splunk/latest/admin/HowSplunkstoresindexes

Create a new index and then you can assign that index to one of your data sources in inputs.conf.
index=something. When the data comes in, it will be stored in that index. You can then use the indexes.conf file to change the per index options.

Look at indexes.conf details here - http://docs.splunk.com/Documentation/Splunk/latest/admin/indexesconf

sdaniels
Splunk Employee
Splunk Employee

Follow this:

http://docs.splunk.com/Documentation/Splunk/latest/admin/Setupmultipleindexes

In the UI whatever context you are in (whichever app) when you click on the Manager link, that is where it will create or modify the indexes.conf file. Look in the 'local' directory under the app. So if you were in the Search app and created an index you'd find the changes in /etc/apps/search/local/. Then use the documentation and/or splunkbase to see how you want to change settings for the retention.

0 Karma

dbcottam
New Member

another thing: I searched my splunk parent directory and there are many indexes.conf files. Which one do I use to alter override the defaults?

0 Karma

dbcottam
New Member

Thank you, I have been exploring the files, and found where to create the indexes in inputs.conf. However, I cannot find where it links in the indexes.conf file. What I think is the index is this "[default]" and if I wanted to change the index it would similar to this "[email]"

Am I on the right path?
Thanks

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...