Getting Data In

Change log storage time

splunkcol
Builder

 

When the indexes were created, they were created by default.

Now that I needed to know how long a log went from hot to warm bucket and finally to frozen, I have the following question.

1. Is this query correct to know how long it is configured to go to frozen?
| rest / services / data / indexes | fields title froz * | rename title as index

2. If I need it not to store the logs for 6 years, which is the value that I see by default, and I need it to store the logs for 6 months, understanding that when the log reaches 6 months it would go to a frozen state and splunk would begin to eliminate the older data.

3. I should create a file called indexes.conf in the "local" folder and set the value frozenTimePeriodInSecs = 15778800

b Should I go to the bin and restart the splunk service for it to take the changes?

4. Would this change immediately erase logs that are already 6 months old in seconds? or does it start from this moment?

Labels (3)
0 Karma

General_Talos
Path Finder

1. Is this query correct to know how long it is configured to go to frozen?
| rest / services / data / indexes | fields title froz * | rename title as index

-- Yes SPL is correct

2. If I need it not to store the logs for 6 years, which is the value that I see by default, and I need it to store the logs for 6 months, understanding that when the log reaches 6 months it would go to a frozen state and splunk would begin to eliminate the older data.

-- https://docs.splunk.com/Documentation/Splunk/8.1.1/Indexer/Setaretirementandarchivingpolicy

 

The maxTotalDataSizeMB and frozenTimePeriodInSecs attributes in indexes.conf help determine when buckets roll from cold to frozen.

 

3. I should create a file called indexes.conf in the "local" folder and set the value frozenTimePeriodInSecs = 15778800

-- Yes , 15778800 (seconds) means something near to 6 months (60*60*24*180) and for exact value is 15552000 (considering 30 days in each month).

b Should I go to the bin and restart the splunk service for it to take the changes?

-- Yes, if you are on "standalone infra" Splunk restart required and if you are on a "indexer cluster" a configuration push with rolling restart of all the peer nodes required.

4. Would this change immediately erase logs that are already 6 months old in seconds? or does it start from this moment?

-- Its not very immediate, based on your infra may take 2-10 min (again its based on your Splunk infra).

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...