Getting Data In

_audit index data retention in Splunk cluster

pcsegal1
Explorer

Hi,

I have a Splunk cluster that consists of:
- 1 cluster master
- 3 indexers
- 1 search head

The indexes at the search head are configured to be forwarded to the indexers.

I would like to set a retention period shorter than the 6-year default to the _audit index in this Splunk cluster.

Normally, to deploy indexes to the indexers, the procedure I use is to create an app with an indexes.conf inside the cluster master's master-apps directory, then push the configuration. However, I'm unsure if this procedure would work for _audit.

How should I go about changing the retention period of the _audit index in all the indexers?

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

HI @pcsegal1,
for my experience, you could have two different approaches, both correct and efficient:

  • you could have all the indexes in a dedicated TA (called e.g. TA_Indexers) located in %SPLUNK_HOME/etc/master-apps, that contains indexes.conf and eventually props.conf and transforms.conf of all your apps , then put in %SPLUNK_HOME/etc/master-apps/_cluster/local indexes.conf for internal indexes (as _audit); in this way you divide physically and concettually your configuration files on Indexers Cluster;
  • in the above TA_Indexers, put all the conf files, both of internal and external indexes.

I prefer the first one, but also the second is correct.

In both cases, remember to add comments to each stanza.

Also the _audit index and the other internal indexes can be managed in this way.

Only one attention: choose the correct retention period related with your security policies and your regulation (e.g. in Italy audit logs must be archived at least for six months).

Ciao and Merry Christmas.
Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

HI @pcsegal1,
for my experience, you could have two different approaches, both correct and efficient:

  • you could have all the indexes in a dedicated TA (called e.g. TA_Indexers) located in %SPLUNK_HOME/etc/master-apps, that contains indexes.conf and eventually props.conf and transforms.conf of all your apps , then put in %SPLUNK_HOME/etc/master-apps/_cluster/local indexes.conf for internal indexes (as _audit); in this way you divide physically and concettually your configuration files on Indexers Cluster;
  • in the above TA_Indexers, put all the conf files, both of internal and external indexes.

I prefer the first one, but also the second is correct.

In both cases, remember to add comments to each stanza.

Also the _audit index and the other internal indexes can be managed in this way.

Only one attention: choose the correct retention period related with your security policies and your regulation (e.g. in Italy audit logs must be archived at least for six months).

Ciao and Merry Christmas.
Giuseppe

pcsegal1
Explorer

I applied your first approach (put in %SPLUNK_HOME/etc/master-apps/_cluster/local an indexes.conf file for the _audit index) and it worked as expected. Thank you and Merry Christmas.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...