Getting Data In

Can you help us build a query to check the time of the earliest event in an index?

Arpit_S
Path Finder

Hi,

In our instance, we have indexes that have current sizes that are more than the maximum size of the index. We just wanted to create and alert to monitor if an index has data older than the specified retention period. For example, if an index has a retention period of 90 days, it ideally should not have data for the 91st day.

Thanks.

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

View solution in original post

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...