Data Retention

Coder supports configurable retention policies that automatically purge old Audit Logs, Connection Logs, Workspace Agent Logs, and API keys. These policies help manage database growth by removing records older than a specified duration.

Overview

Large deployments can accumulate significant amounts of data over time. Retention policies help you:

  • Reduce database size: Automatically remove old records to free disk space.
  • Improve performance: Smaller tables mean faster queries and backups.
  • Meet compliance requirements: Configure retention periods that align with your organization's data retention policies.

Note

Retention policies are disabled by default (set to 0) to preserve existing behavior. The exceptions are API keys and workspace agent logs, which default to 7 days.

Configuration

You can configure retention policies using CLI flags, environment variables, or a YAML configuration file.

Settings

SettingCLI FlagEnvironment VariableDefaultDescription
Audit Logs--audit-logs-retentionCODER_AUDIT_LOGS_RETENTION0 (disabled)How long to retain Audit Log entries
Connection Logs--connection-logs-retentionCODER_CONNECTION_LOGS_RETENTION0 (disabled)How long to retain Connection Logs
API Keys--api-keys-retentionCODER_API_KEYS_RETENTION7dHow long to retain expired API keys
Workspace Agent Logs--workspace-agent-logs-retentionCODER_WORKSPACE_AGENT_LOGS_RETENTION7dHow long to retain workspace agent logs

Duration Format

Retention durations support days (d) and weeks (w) in addition to standard Go duration units (h, m, s):

  • 7d - 7 days
  • 2w - 2 weeks
  • 30d - 30 days
  • 90d - 90 days
  • 365d - 1 year

CLI Example

coder server \ --audit-logs-retention=365d \ --connection-logs-retention=90d \ --api-keys-retention=7d \ --workspace-agent-logs-retention=7d

Environment Variables Example

export CODER_AUDIT_LOGS_RETENTION=365d export CODER_CONNECTION_LOGS_RETENTION=90d export CODER_API_KEYS_RETENTION=7d export CODER_WORKSPACE_AGENT_LOGS_RETENTION=7d

YAML Configuration Example

retention: audit_logs: 365d connection_logs: 90d api_keys: 7d workspace_agent_logs: 7d

How Retention Works

Background Purge Process

Coder runs a background process that periodically deletes old records. The purge process:

  1. Runs approximately every 10 minutes.
  2. Processes records in batches to avoid database lock contention.
  3. Deletes records older than the configured retention period.
  4. Logs the number of deleted records for monitoring.

Effective Retention

Each retention setting controls its data type independently:

  • When set to a non-zero duration, records older than that duration are deleted.
  • When set to 0, retention is disabled and data is kept indefinitely.

API Keys Special Behavior

API key retention only affects expired keys. A key is deleted only when:

  1. The key has expired (past its expires_at timestamp).
  2. The key has been expired for longer than the retention period.

Setting --api-keys-retention=7d deletes keys that expired more than 7 days ago. Active keys are never deleted by the retention policy.

Keeping expired keys for a short period allows Coder to return a more helpful error message when users attempt to use an expired key.

Workspace Agent Logs Behavior

Workspace agent logs are deleted based on when the agent last connected, not the age of the logs themselves. Logs from the latest build of each workspace are always retained regardless of when the agent last connected. This ensures you can always debug issues with active workspaces.

For non-latest builds, logs are deleted if the agent hasn't connected within the retention period. Setting --workspace-agent-logs-retention=7d deletes logs for agents that haven't connected in 7 days (excluding those from the latest build).

Best Practices

For most deployments, we recommend:

retention: audit_logs: 365d connection_logs: 90d api_keys: 7d workspace_agent_logs: 7d

Compliance Considerations

Warning

Audit Logs provide critical security and compliance information. Purging Audit Logs may impact your organization's ability to investigate security incidents or meet compliance requirements. Consult your security and compliance teams before configuring Audit Log retention.

Common compliance frameworks have varying retention requirements:

  • SOC 2: Typically requires 1 year of audit logs.
  • HIPAA: Requires 6 years for certain records.
  • PCI DSS: Requires 1 year of audit logs, with 3 months immediately available.
  • GDPR: Requires data minimization but does not specify maximum retention.

External Log Aggregation

If you use an external log aggregation system (Splunk, Datadog, etc.), you can configure shorter retention periods in Coder since logs are preserved externally. See Capturing/Exporting Audit Logs for details on exporting logs.

Database Maintenance

After enabling retention policies, you may want to run a VACUUM operation on your PostgreSQL database to reclaim disk space. See Maintenance Procedures for guidance.

Keeping Data Indefinitely

To keep data indefinitely for any data type, set its retention value to 0:

retention: audit_logs: 0s # Keep audit logs forever connection_logs: 0s # Keep connection logs forever api_keys: 0s # Keep expired API keys forever workspace_agent_logs: 0s # Keep workspace agent logs forever

Monitoring

The purge process logs deletion counts at the DEBUG level. To monitor retention activity, enable debug logging or search your logs for entries containing the table name (e.g., audit_logs, connection_logs, api_keys).

  • Audit Logs: Learn about Audit Logs and manual purge procedures.
  • Connection Logs: Learn about Connection Logs and monitoring.