Monitoring Splunk

Use _indextime for data retention policy?

jinxkamada
Explorer

Is it possible to reconfigure Splunk to use _indextime instead of _time for data retention policy?

Labels (1)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

Can't you use time of ingestion as _time (which would influence retention) and use another field for storing your event's time (in this case it could make sense to make it an indexed field).

Buckets are rolled based on either age of data within the bucket (in terms of _time) or index size. That's it.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

That is not possible.

What problem are you trying to solve?

---
If this reply helps you, Karma would be appreciated.

jinxkamada
Explorer

I am regularly uploading a file over Splunk which I use for my reporting (might include events with various timestamp). 

I don't want data retention policy to be bounded by _time since it might affect the report I am creating. 
I definitely want Splunk to delete older uploads based on indexed time to manage my server disk usage.

Any suggestion will be appreciated!


0 Karma

PickleRick
SplunkTrust
SplunkTrust

Can't you use time of ingestion as _time (which would influence retention) and use another field for storing your event's time (in this case it could make sense to make it an indexed field).

Buckets are rolled based on either age of data within the bucket (in terms of _time) or index size. That's it.

isoutamo
SplunkTrust
SplunkTrust

Or is there a possibility to use separate index for those events and afterwards even swipe out that content?

Anyhow as @PickleRick said a bucket is removed after all events inside it has expired. Using old and new data (timestamp/_time point of view) usually make this to take quite long time.

jinxkamada
Explorer

Most of the indexes we have right now are used for the same purpose of creating a report.

It would have been ideal for me if they can use the Search menu (out-of-the-box UI) so it would save me the hassle of creating a custom UI to point datetime filtering to the correct field.

However, I would say your recommendations do make sense.
Thanks for the inputs!  

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...