Splunk® Enterprise

Admin Manual

List of configuration files

The following is a list of some of the available spec and example files associated with each conf file. Some conf files do not have spec or example files. Contact Support before editing a conf file that does not have an accompanying spec or example file.

Do not edit the default copy of any conf file in $SPLUNK_HOME/etc/system/default/. See How to edit a configuration file.

File Purpose
agent_management.confConfigure the Agent Management feature.
alert_actions.confCreate an alert.
app.confConfigure app properties
audit.confConfigure auditing and event hashing. This feature is not available for this release.
authentication.confToggle between Splunk's built-in authentication or LDAP, and configure LDAP.
authorize.confConfigure roles, including granular access controls.
bookmarks.confBookmark monitoring console URLs.
checklist.confCustomize monitoring console health check.
collections.confConfigure KV Store collections for apps.
commands.confCreate custom search commands for apps in Splunk Cloud Platform or Splunk Enterprise using in the Developer Guide on the Developer Portal.
datamodels.confAttribute/value pairs for configuring data models.
default.metaSet permissions for objects in a Splunk app.
deploymentclient.confSpecify behavior for clients of the deployment server.
distsearch.confSpecify behavior for distributed search.
event_renderers.confConfigure event-rendering properties.
eventtypes.confCreate event type definitions.
federated.confSearch data outside of your own Splunk platform deployment.
fields.confCreate multivalue fields and add search capability for indexed fields.
global-banner.confDisplay a global banner on all pages in Splunk Web.
health.confSet the default thresholds for proactive Splunk component monitoring.
indexes.confManage and configure index settings.
inputs.confSet up data inputs.
instance.cfgDesignate and manage settings for specific instances of Splunk. This can be handy, for example, when identifying forwarders for internal searches.
limits.confSet various limits (such as maximum result size or concurrent real-time searches) for search commands.
literals.confCustomize the text, such as search error strings, displayed in Splunk Web.
macros.confDefine search macros in Settings.
messages.confCustomize Splunk Web messages.
metric_rollups.confSet attribute/value pairs for metric rollup policy entries.
multikv.confConfigure extraction rules for table-like events (ps, netstat, ls).
outputs.confSet up forwarding behavior.
passwords.confMaintain the credential information for an app.
procmon-filters.confMonitor Windows process data.
props.confSet indexing property configurations, including timezone offset, custom source type rules, and pattern collision priorities. Also, map transforms to event properties.
pubsub.confDefine a custom client of the deployment server.
restmap.confCreate custom REST endpoints.
rolling_upgrade.confSet up configurations for an automated search head cluster rolling upgrade or an automated indexer cluster rolling upgrade.
savedsearches.confDefine ordinary reports, scheduled reports, and alerts.
searchbnf.confConfigure the search assistant.
segmenters.confConfigure segmentation.
server.confContains a variety of settings for configuring the overall state of a Splunk Enterprise instance. For example, the file includes settings for enabling SSL, configuring nodes of an indexer cluster or a search head cluster, configuring KV store, and setting up a license manager.
serverclass.confDefine deployment server classes for use with deployment server.
serverclass.seed.xml.confConfigure how to seed a deployment client with apps at start-up time.
source-classifier.confTerms to ignore (such as sensitive data) when creating a source type.
sourcetypes.confMachine-generated file that stores source type learning rules.
tags.confConfigure tags for fields.
telemetry.confEnable apps to collect telemetry data about app usage and other properties.
times.confDefine custom time ranges for use in the Search app.
transactiontypes.confAdd additional transaction types for transaction search.
transforms.confConfigure regex transformations to perform on data inputs. Use in tandem with props.conf.
ui-prefs.confChange UI preferences for a view. Includes changing the default earliest and latest values for the time range picker.
user-prefs.confConfigure settings on a per-user basis for use by Splunk Web.
user-seed.confSet a default user and password.
visualizations.confList the visualizations that an app makes available to the system.
viewstates.confUse this file to set up UI views (such as charts).
web.confConfigure Splunk Web, enable HTTPS.
web-features.confConfigure some Splunk Web settings.
wmi.confSet up Windows management instrumentation (WMI) inputs.
workflow_actions.confConfigure workflow actions.
workload_policy.confEnable or disable admission rules in workload management.
workload_pools.confConfigure workload pools (compute and memory resource groups) that you can assign to searches in workload management.
workload_rules.confConfigure workload rules to define access and priority for workload pools in workload management.
Last modified on 03 April, 2025
When to restart Splunk Enterprise after a configuration file change   Configuration parameters and the data pipeline

This documentation applies to the following versions of Splunk® Enterprise: 9.4.0, 9.4.1


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

close