server.conf - Splunk Documentation (original) (raw)

The following are the spec and example files for server.conf.

server.conf.spec

Version 9.4.2

OVERVIEW

This file contains settings and values to configure server options

in server.conf.

Each stanza controls different search commands settings.

There is a server.conf file in the $SPLUNK_HOME/etc/system/default/ directory.

Never change or copy the configuration files in the default directory.

The files in the default directory must remain intact and in their original

location.

To set custom configurations, create a new file with the name server.conf in

the $SPLUNK_HOME/etc/system/local/ directory. Then add the specific settings

that you want to customize to the local configuration file.

For examples, see server.conf.example. You must restart the Splunk instance

to enable configuration changes.

To learn more about configuration files (including file precedence) see the

documentation located at

http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles

GLOBAL SETTINGS

Use the [default] stanza to define any global settings.

* You can also define global settings outside of any stanza at the top

of the file.

* Each configuration file should have at most one default stanza.

If you have multiple default stanzas, settings are combined. If you

have multiple definitions of the same settings, the last definition

in the file wins.

* If a setting is defined at both the global level and in a specific

stanza, the value in the specific stanza takes precedence.

General Server Configuration

[general] serverName =

hostnameOption = [ fullyqualifiedname | clustername | shortname ]

sessionTimeout = [s|m|h|d]

invalidateSessionTokensOnLogout =

logoutCacheRefreshInterval = [s|m|h|d]

trustedIP =

allowRemoteLogin = always|never|requireSetPassword

tar_format = gnutar|ustar

access_logging_for_phonehome =

hangup_after_phonehome =

pass4SymmKey =

pass4SymmKey_minLength =

unbiasLanguageForLogging =

listenOnIPv6 = no|yes|only

connectUsingIpVersion = auto|4-first|6-first|4-only|6-only

guid =

useHTTPServerCompression =

defaultHTTPServerCompressionLevel =

skipHTTPCompressionAcl =

legacyCiphers = decryptOnly|disabled

site =

useHTTPClientCompression = true|false|on-http|on-https

embedSecret =

parallelIngestionPipelines =

pipelineSetAutoScale =

pipelineSetSelectionPolicy = round_robin|weighted_random|blocked_queue_count

pipelineSetWeightsUpdatePeriod =

pipelineSetNumTrackingPeriods =

pipelineSetChannelSetCacheSize =

instanceType =

requireBootPassphrase =

numThreadsForIndexInitExecutor =

remoteStorageRecreateIndexesInStandalone =

cleanRemoteStorageByDefault =

is_remote_queue_accounting_batched =

recreate_index_fetch_bucket_batch_size =

recreate_bucket_fetch_manifest_batch_size =

splunkd_stop_timeout =

decommission_search_jobs_wait_secs =

decommission_search_jobs_min_wait_ratio =

python.version = python3|python3.7|python3.9|force_python3|unspecified

roll_and_wait_for_uploads_at_shutdown_secs =

preShutdownCleanup =

reset_manifests_on_startup =

percent_manifests_to_reset =

regex_cache_hiwater =

enable_search_process_long_lifespan =

conf_generation_include. =

encrypt_fields =

conf_cache_memory_optimization =

conf_cache_rebuild_stanzas_optimization =

cgroup_location =

Configuration Change Tracker

[config_change_tracker] disabled =

mode = [auto|diff|track-only]

denylist =

log_throttling_disabled =

log_throttling_threshold_ms =

exclude_fields =

Deployment Configuration details

[deployment] pass4SymmKey = * Authenticates traffic between the deployment server (DS) and its deployment clients (DCs). * By default, DS-DCs passphrase authentication key is disabled. To enable DS-DCs passphrase authentication, you must also add the following line to the [broker:broker] stanza in the restmap.conf file: requireAuthentication = true * If the key is not set in the [deployment] stanza, the key is looked for in the [general] stanza. * NOTE: Unencrypted passwords must not begin with "$1$", because this is used by Splunk software to determine if the password is already encrypted.

pass4SymmKey_minLength =

TLS/SSL Configuration details

[sslConfig]

enableSplunkdSSL =

useClientSSLCompression =

useSplunkdClientSSLCompression =

sslVersions =

sslVersionsForClient =

supportSSLV3Only =

sslVerifyServerCert =

sslCommonNameToCheck =

sslCommonNameList = , , ...

sslAltNameToCheck =

requireClientCert =

sslVerifyServerName =

caTrustStore = <[splunk],[OS]>

caTrustStorePath =

cipherSuite =

ecdhCurveName =

ecdhCurves =

serverCert =

sslKeysfile =

sslPassword =

sslKeysfilePassword =

sslRootCAPath =

sslRootCAPathHonoredOnWindows =

caCertFile =

dhFile =

caPath =

certCreateScript =