I'm not sure what you mean by "old logs"? I'm guessing your question has to do with how splunk stores events in general. There is also the discussion about event-retention policies which has to do with how long your events (or logs) are kept around after they have been indexed by splunk, but since your evaluating splunk, I'm guessing you aren't running to that just yet.
Splunk stores all log as indexed events in a proprietary database-like "index" under your splunk install location.
If your a looking for sizing information, it may be helpful to visit the directory where your data is stored. Out of the box, splunk contains several indexes (sometimes called "databases"). Here is the location of your "main" (default) index:
$SPLUNK_HOME/var/lib/splunk/defaultdb
The docs should give you a better idea of how this works. I would start here: What's a Splunk index? and follow the various links provided.