Skip to main content
Solved

What happens with retention setting in Splunk with timestamp from Replay?

  • March 11, 2025
  • 5 replies
  • 8 views

:question: on S3 Replay -> Splunk. Is it necessary for the destination Splunk Index to have retention settings that honor the timestamps of the replayed data? For example, If my index 'proxy-logs' has a retention of 180 days, and I replay data into it with timestamps that is > 200 days, I presume that data would be immediately evicted/frozen by Splunk?

Best answer by dritan

correct. i'd just create a couple with a very high `frozenTimePeriodInSecs`

5 replies

Raanan Dagan
  • Employee
  • March 11, 2025

If I am not mistaken, 180 days is Splunk Index time, not event time


  • Employee
  • March 11, 2025

nah


  • Employee
  • March 11, 2025

splunk retention/frozen is based on _time not on indextime


  • Author
  • Known Participant
  • March 11, 2025

So then create some replay specific indexes that have longer retention than typical? We use smartstore so storage size isn't a concern, but trying to understand best practice for replay.


  • Employee
  • Answer
  • March 11, 2025

correct. i'd just create a couple with a very high `frozenTimePeriodInSecs`