I have the app Splunk_TA_microsoft_ad and I am trying to reduce the storage size of the index "wineventlog" from 50gb to around 15-20gb. I have tried updating the index in the GUI through the indexes page and updating the indexes.conf file and nothing seems to update. I've updated the indexes.conf file below with the config below and restarted splunk service.
/opt/splunk/etc/apps/Splunk_TA_microsoft_ad/local/indexes.conf
My config looks like this:
[wineventlog]
bucketRebuildMemoryHint = 0
compressRawdata = 1
enableDataIntegrityControl = 0
enableOnlineBucketRepair = 1
enableTsidxReduction = 0
maxTotalDataSizeMB = 15360
minHotIdleSecsBeforeForceRoll = 0
rtRouterQueueSize =
rtRouterThreads =
suspendHotRollByDeleteQuery = 0
syncMeta = 1
maxDataSize = 5120
Is indexes.conf only defined in one place? When you say "it doesn't update," I assume that you mean that your changes are saved in the file, but that nothing actually changes the size of the index.
I suggest that you check
1. Configuration file precedence - if indexes.conf is defined in multiple places, overlapping definitions are resolved based on the rules of precedence
2. Do you need to restart Splunk? When you manually edit indexes.conf, you need to restart Splunk for the changes to take effect.
Is indexes.conf only defined in one place? When you say "it doesn't update," I assume that you mean that your changes are saved in the file, but that nothing actually changes the size of the index.
I suggest that you check
1. Configuration file precedence - if indexes.conf is defined in multiple places, overlapping definitions are resolved based on the rules of precedence
2. Do you need to restart Splunk? When you manually edit indexes.conf, you need to restart Splunk for the changes to take effect.
That was it. Total noob mistake on my part. Didn't realize it was also configured in:
/opt/splunk/etc/system/local/indexes.conf
Everybody does it. Some of us do it more than once!